The Savvy Guide to Home Security 0790613158, 9780790613154

It’s your home, your castle. You need to protect it. John Mueller, author of over 60 books, takes you through the steps

223 72 17MB

English Pages 287 [292] Year 2005

Report DMCA / Copyright

DOWNLOAD FILE

Polecaj historie

The Savvy Guide to Home Security
 0790613158, 9780790613154

Citation preview

‘ e ise

uaa ee x

Digitized by the Internet Archive in 2022 with funding from Kahle/Austin Foundation

https://archive.org/details/savvyguidetohome0000muel

THE SAVVY GUIDE TO HOME SECURITY

Other books in the SAVVY Guide series The Savvy Guide to Home Theater, ISBN 0-7906-1303-4

The Savvy Guide to Digital Photography, ISBN 0-7906-1309-3 The Savvy Guide to Fantasy Sports, ISBN 0-7906-1313-1

The Savvy Guide to Digital Music, ISBN 0-7906-1317-4 The Savvy Guide to Motorcycles, ISBN 0-7906-1316-6

Mueller, John, 1958The savvy guide to home

security

/

C

35305210993253 ca 08/21/06

THE SAVVY GUIDE TO HOME SECURITY John Paul Mueller

INDYAECHiS PUBLISHING Indianapolis

© 2005 by Sams Technical Publishing, LLC, under the Indy-Tech Publishing imprint. Indy-Tech Publishing is an imprint of Sams Technical Publishing, LLC, 9850 E. 30th St., Indianapolis, IN 46229. All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained within. While every precaution has been taken in the preparation of this book, the author, the publisher, or seller assumes no responsibility for errors and omissions. Neither is any liability assumed for damages or injuries resulting from the use of information contained herein. The advice and strategies contained within may not be suitable for every situation. This book is sold with the understanding that the publisher is not engaged in rendering legal, accounting or other professional services. The fact that an organization or website is referred to in this work as a citation or potential

source of further information does not mean that the author or the publisher endorses the information the organization or website may provide or recommendations a third party may make. Please be aware that websites referenced in this text may have changed or disappeared between the time the book was written and the time at which you read it. As this book may be technical in nature, we recommend that a professional be consulted if you feel you have gone too far. Electronics involve electricity, which should be dealt with very carefully. International Standard Book Number:

Chief Executive Officer: President: Chief Operating Officer: Acquisitions Editor: Editorial Assistant: Copy Editor: Technical Editor: Typesetter: Cover Design: Cover Photos: Interior Illustrations: Interior Photos: Drawings:

0-7906- 1315-8

Alan Symons Scott Weaver Richard White Brad Schepp Dana Eaton Cheryl Hoffman Richard White Cheryl Hoffman Robin Roberts Provided by Andrew Gordon Provided by the author Provided by the author Provided by the author

Trademark acknowledgments: Where the names of companies, brands, etc are used, the registered trademarks have generally been noted. The companies mentioned in this text in no way endorse the contents of this book, nor have they participated in the publication of this book. All product illustrations, names, and logos are trademarks of their respective manufacturers, including all terms in this book that are known or suspected to be trademarks or service marks. Use of an illustration, term, or logo in this book should not be regarded as affecting the validity of any trademark or service mark, or regarded as an association with or endorsement from the respective trademark holder. Manufactured in the USA, at Ripon Community Printers, Ripon, WI

To the instructors at Milwaukee Technical High School who gave me my start in electronics.

I have always viewed my four years there as time well spent.

7 -

0

jm

-

‘ile ee

i

: _

ee: ae

joel

ee

a

ig

wh

S

ae iis

¥

it ji ’

e

a

: =.

7

:

:

wl

CONTENTS SS

Acknowledgments Introduction

i

Why I Wrote This Book, 12 - What This Book Can Offer You, 13 - How This Book Is

Organized, 13 - Who Should Read This Book? 16 - Icons Used in This Book, 17

Hi

Understanding

Your Home Security Needs

19

Defining Home Security, 20 - Deciding What You Want to Protect, 23 - Determining

What Kind of System You Need, 27 - Interview with Doug Bentley, 34 . Setting a Security System Price Goal, 43 - Physical Security versus Alarms and Monitoring, 44 -

Understanding Home Security Risks, 44 . Creating an Escape Route Plan, 48 - Let’s Start Securing, 48

2

Choosing a Preconfigured Solution

51

Determining Whether a Custom Solution Makes Sense, 52 . Considering Security Vendor Services, 54 - Interview with Jamie Goldsmith, 58 . Monitoring Home System

Alarms, 68 - Let’s Start Securing, 70

3

Designing a Hybrid System Defining a Hybrid System, 74 . Considering Your Capabilities, 79 - Interview

with Tom Peters, 80 - Defining the System, 85 - Contracting the Hybrid System Work, 89 - Let’s Start Securing, 90

73

Contents

4

Considering Custom Solutions

93

Defining Custom Solution Requirements, 94 - Considering Security Sensors, 100

-

Interview with Eric Gagnon, 102 - Developing Physical Security Elements, 117 Enabling Those with Special Needs, 119 - Let's Start Securing, 120

5

Installing the Hardware

BAL

Understanding the Security System Types, 122 - Installing the Security System, 125 - Security Camera Components, 131

- Running Cables, 138 . Adding Physical

Security, 141 - Securing Wireless and Hardwired Systems, 142 - Considering Power Requirements, 144 - Configuring the Software, 146 - Let's Start Securing, 148

6

Testing the Setup

158

Validating the System, 152 - Interview with Mark Mueller, Preplanned Security Test,

154 - Performing a

161 - Checking the Monitoring System, 165 - Conducting

Physical System Checks, 167 - Using an Outside Testing Company, 175 - Conducting a Power-Off Test, 176 -

7

Let's Start Securing, 178

Adding Automation as Needed Understanding Automation Basics,

181 183 . Considering the Types of Automation,

189 - Interview with Muhammad and Marilyn Kharbush, 190 . Relying on Simple Automation Whenever Possible, 199 . Adding Timers, 200 . Using a Personal Computer, 201 - Working with Remote Connections, 203 . Understanding When Automation is Counterproductive, 204

- Keeping the Automation Secure, 205

- Let’s

Start Securing, 205

8

Maintaining Your System Good, Better, and Best Maintenance Practices, 208

200 - Cleaning the System, 213

-

Interview with Greg Hahn, 214 - Performing Random Testing, 222 . Updating Your Equipment, 223 . Diagnosing Potential Problems, 227 - Let’s Start Securing, 228

Appendix A: Home Security Vendors

229

Appendix B: Fifty-two Savvy Tips for Better Home Security

249

Appendix C: An Overview of Home Security Standards

257

Glossary

267

Index

281

About the Author

287

ACKNOWLEDGMENTS

Thanks to my wife, Rebecca, for working with me to get this book completed. I really don’t know

what I would have done without her help in researching and compiling some of the information

that appears in this book. She also did a fine job of proofreading my rough draft and page proofing the result. Rebecca also helps a great deal with the glossaries in my books, especially in this one, where I might have missed important words.

A number of people read all or part of this book to help me refine the approach and to test the procedures I provide. These unpaid volunteers helped in ways too numerous to mention here. I especially appreciate the efforts of Eva Beattie, who read the entire book and selflessly devoted

herself to this project. All of the interviews you see in the book were generously provided by professionals who want to ensure that everyone remains safe. I very much appreciate the time they spent working with me. A number of other readers tested procedures and helped refine the book in other ways. Finally, I would like to thank Brad Schepp, Richard A. White, Cheryl Hoffman, and the rest of

the editorial and production staff at Sams for their assistance in bringing this book to print. It’s always nice to work with such a great group of professionals.

iy it

JVIQHAOA

@

eo oaere

oo=

@

6

sete

-

Se

>

Vila p

f

if

oe

elaar

Cth

i Tk

my

jek

mien eee gad im

|

|

Suny

amy Mia

rise

if

MA

A a A

ray ©.

ort) ee

orn

merry

Rulwerd

\io'ee

Tlie

fi eeirly wave’

=

Lae

it

fi

Thi

Aly

ola

Le

INTRODUCTION a

eeling safe in your home—having peace of mind about the environment that you come home . to at night—is incredibly important in a world that seems to have a little more violence in it every day. A home security system can provide a level of peace of mind for anyone. It doesn’t matter whether you rent or own your own home; a security system is an essential part of keeping intruders at bay.

The savvy security user knows that security systems provide a lot more than just peace of mind. Besides addressing security needs, you can connect your smoke, carbon monoxide, and radon

detectors to a security system and improve your chances of survival in the event of an emergency. That's right! A good security system can become a matter of life and death. In many respects, a

security system becomes another form of insurance—another way of ensuring that you don’t lose everything in a fire or other disaster.

Security systems can provide still more. With the right equipment, you can monitor your chil-

dren and know immediately if someone falls into the pool. The addition of a panic button sum-

mons help immediately should the need arise. A better security system also addresses human needs. It becomes another person in your home—the one who’s always watching everyone and always aware if disaster overtakes someone you love.

You might not realize it, but many people also use their security system as a form of entertainment. The best security systems rely on cameras to spy intruders before they enter your home. Those same cameras have other uses. For example, you can see nature in all its glory. Watching 11

a deer outside your home on camera might not be quite the same as being there and touching it, but it’s as close as many people can get and much safer than trying to interact with a wild animal

directly.

No matter what your reason for installing a security system, this book can help you design it, define the requirements, figure out how much it will cost, install it, test it, and maintain it afterward. Nothing is left to chance. The Savvy Guide to Home Security discusses every need and provides the resources you need to obtain a great security system within budget and on time.

Why | Wrote THis Book Feeling secure in your home, having peace of mind—they’re important reasons to add a home security system. Unfortunately, when I started looking for an appropriate solution online and in the stores, it quickly became apparent that I was going to have to spend a lot of time researching

the topic. Conflicting vendor claims, features lists that are difficult to understand, and the concern

that someone would sell me something that wouldn't do the job all preyed on my mind, and I’m sure that it’s a concern for many other people as well. No one seemed to have an answer for the

simplest questions: “Does that simple system with two door switches and a motion detector really do the job?” You'll find the answer to that question in chapter 1.

The Savvy Guide to Home Security is the result of months of research, including interviews with professionals—people who really do know the answers but seldom have time to talk with the public. My goal in performing all of this work is to answer not only my own questions but hopefully your questions as well. You won't find a more complete resource anywhere. I’ve asked all of the questions, now all you need to do is read the answers—they really are all here.

I actually use all of the books I write. They reside on the bookshelf over the top of my computer monitor where I can get to them quickly. I wrote this book because I needed it. The information isn’t easily accessible anywhere online. However, I needed something more than a onetime ref-

erence for buying a security system. That’s why this book discusses so many other topics. For example, many people install their security system and never test it afterward. It’s impossible to know whether the security system will actually tell you when an intruder is near, so this book includes maintenance and testing instructions. Peace of mind only comes when you know beyond any doubt that your security system actually does what the vendor says it will do. iz

es

lntrodiction

WHAT Tuis Book CAN OFFER You You might not have years of electronics and computer experience to fall back on when you buy a security system. That’s why this book contains all the facts in an easy-to-understand form. I know that you're a savvy buyer who just needs the right information to make a great buying decision. A security system should offer more than just simple peace of mind; you should know that you obtained the best possible product that your budget can provide, and this book helps you do that.

Some people will buy the security system and let others install it, others will install the system themselves, while a third group will want to help with the installation but not do everything. The

Savvy Guide to Home Security provides everything you need no matter which group you fall into. You can participate as little or as much as you want in the installation process. This book appeals to the savvy installer because it helps you make a good decision on how much help to get when

you install your security system. The savvy buyer doesn’t just install a security system and think the job is done. This book empha-

sizes methods you can use to work with your security system to build a more secure home. Not only will you discover the techniques for building a good escape plan, but you'll also learn tech-

niques for addressing your family’s specific needs. For example, this book discusses use of vari-

ous types of panic buttons and the need to create a safe room to use if an intruder does get into your house.

How Tuis Book Is ORGANIZED This book contains eight chapters that address specific security system needs. You'll begin by designing your security system and move to making a purchase, installing the security system, testing it, and finally maintaining it. This book discusses the entire life cycle of a security system

so there’s no guesswork. The following sections outline the contents in detail. Chapter 1: Understanding Your Home Security Needs

This chapter discusses the basics of a security system. It answers the question of what kind of security system you need depending on what you want to protect, where you live, what kind of environment you live in, and what you can afford. You'll also see how to lay out the security sys13

Introduction

tem in your home and get a feeling for how the security system functions. Most importantly, this chapter discusses what you need to know to create an escape plan. Chapter 2: Choosing a Preconfigured Solution

Many people don’t want to spend time creating and installing their own security system. In fact, depending on your skills, having someone else do the work might be the best idea. However, you can't simply offload the work and expect to get a good result. This chapter helps you understand what you need to do to get a great installation from someone else and what to look out for if they're trying to give you something less. Not only will you discover how to find the best vendor for your particular needs, you'll also learn about many of the considerations for negotiating a contract that

helps you maintain a good relationship with the vendor. Chapter 3: Designing a Hybrid System

Some people want to work on at least part of the security system, but they aren’t sure they can

install the entire system themselves. This chapter shows you how to take a halfway approach. You'll only perform the work that you feel you can do yourself. Not only will you save money using these techniques, but you'll also gain a better understanding of how you can get professionals to work with you. One of the focal points of this chapter is scheduling your work and the vendor work so that you get a good result in a minimum of time. Chapter 4: Considering Custom Solutions

There’s nothing like the feeling of taking charge of the entire security system project yourself. This chapter helps you understand the requirements for creating a custom solution of your own and introduces you to a wealth of vendors who will help you accomplish that task. What’s most important is that this chapter helps you decide what to install; it introduces you to the vast array of sensors that you can obtain to meet specific needs. Chapter 5: Installing the Hardware Running cabling might seem like a mundane task, but you have to plan for it. In fact, all hard-

ware installation tasks require careful planning or your security system won’t perform as expected. This chapter helps you plan and implement the hardware installation phase of your

security system. Even if you aren't planning to install the system yourself, it pays to read this 14

seh e ek a Sy ie

00S

chapter to gain an understanding of what the people you hire to do the work should be doing. Chapter 6: Testing the Setup

No matter how you install your security system—whether you do it yourself or hire someone else to do it—you still need to test it. Testing your system verifies that the hardware does indeed work as anticipated. In addition, it helps you learn more about your security system because you end up working with every element in the system. This is an essential chapter for anyone who installs a security system since it will turn peace of mind from theory into a reality. Chapter 7: Adding Automation as Needed

Most security systems offer some level of automation; the more complex your security system, the more automation that it’s likely to offer. This chapter helps you understand security system automation and provides some guidelines on its use. Not only will you discover uses for localized automation, but you'll also discover how using the Internet can extend the automation to any part of the world. Chapter 8: Maintaining Your System

Installing a security system isn’t the end of the road. If you simply install the security system and let it go after that, you don’t really know that the system will continue to work. In fact, it’s quite

likely that it will fail at some point and you won't even know it. This chapter helps you understand the need to maintain your security system at its peak performance and provides procedures for maintaining most types of security equipment.

Glossary and Appendixes

Every technical book should have a glossary. Terminology is one of the most difficult parts of communication. The glossary in this book explains what I mean by certain terms. You can use the glossary to discover the meaning of any unfamiliar terms as I use them in this book. The appendixes contain useful resource information that you might never need, but you should review it anyway. Appendix A contains a list of vendors that youllfind helpful as you begin your security system

installation experience. The description of each vendor will give you an idea of what the vendor provides, where you can find the vendor mentioned in the book, and how to contact the vendor

for additional information. Appendix B provides fifty-two savvy tips you can use to create a better 15

Introduction

security environment, one tip for every week of the year. By the time you get through all fifty-two tips, you'll find that you're a security expert. Appendix C contains a list of essential standards for home security. You should care about standards because they ensure that you get the highest-quality installation with the best parts available. Standards are an essential part of any great security system installation.

Who SHOULD READ THIS Book? Everyone! While this statement might seem too bold, it’s true. Ultimately, we all need some sort of home security system. For some, it’s a simple lock on the door. For others, it’s a complex, monitored system. In the end, you, the reader, need to determine at what level you want to protect

your home. You get to that level by evaluating what you want to protect and how much time and effort you want to expend to provide protection. This is a great book for anyone who wants a secure home environment. It doesn’t assume anything about you as a person, just that you want to get the best security system possible and you

don’t mind spending a little time and effort to get it. This book does all of the hard research for

you and imparts the wisdom of seven professionals who deal with home security on a daily basis. Statistics show that city dwellers aren’t the only ones with home security problems; the relative

lack of police surveillance makes rural areas attractive to intruders. The similarities between urban and rural security systems end with the need for home security, and this book addresses

each of those needs directly.

Everyone has something different to protect, a different security environment, and different requirements to consider. A real estate broker with a home office in the suburbs has different needs from someone who stores valuable collectibles in a high-risk area in the city. In short, every-

one is interested in attaining the same goal but must take different paths to accomplish it. Rather than taking a one-size-fits-all approach to home security, this book meets the audience’s needs by

tailoring security solutions to specific categories. At minimum, you want to protect yourself, your family, and your home.

I'm also not assuming anything about your finances. Everyone will have a different level of income and other resources for installing and maintaining a security system. This book addresses that need by providing three levels of security systems for each category. Someone with greater needs can choose the best security options, while those who have lesser needs can choose the 16

ee

Miittocitction

better security options, and you might find that all you need is a good security option in some areas. In the end, you have to weigh what is best for you and your family. Your peace of mind and your family’s safety are as valuable as any material possession in your home.

ICONS USED IN THIS Book This book uses a number of icons to identify special kinds of information. These icons alert you to something unique, something that you should pay particular attention to as you read the book. Here are the five icons used in this book and a description of what they mean. A Sawvy Tip gives you special information—usually something that you won't find anywhere else. These tips often make the difference between someone who’s buying any security system and the savvy buyer who is tailoring a security system to meet specific needs. This is the kind of experiential knowledge that makes you someone special, someone whom the security community will recognize as knowledgeable and able to work with them.

For More Information. Sometimes you need just a little more information about a topic discussed in the book. Yes, the book described the topic well but possibly not in enough detail to meet your specific needs. This icon alerts you to additional information that you can find online. Normally, this icon points you to a detailed resource provided by a vendor or other professional resource.

For Skeptics. Not everyone will accept the information in this book many people want proof. Although this book strives to provide as many sible, sometimes it will direct you to a resource that provides detailed security concept. You can skip this information if you agree with what

at face value; details as posproof about a the text is say-

ing; only the skeptic needs to read further. Information identified by the magnifying glass icon is of three sorts:

e

Added detail. This is information that is nice to know but not essential for your understanding of the security topic. In fact, the information might not even relate directly to the current discussion; it might have only a casual relationship to the topic as a whole. The ancillary details are sometimes important for a complete under17

Introduction

standing of a security topic, but not necessary for simply installing a system. You can skip the information

if you want only the information that you must have to buy,

install, set up, test, and maintain your security system. Background info. Some people like toe know the basis for a piece of information or the reason that the information is so important. Text identified by this icon provides that information, which you can use as a basis for additional research.

Elaboration. Sometimes it’s better not to include every detail in a discussion. This information elaborates on the current discussion, extending it in a way that com-

pletes the discussion for those who want to know more than the minimum required. You can skip this information if you’re happy with the level of discussion provided in the standard text.

18

UNDERSTANDING YOUR HOME SECURITY NEEDS

hen most people use the word “home,” they have a specific kind of home in mind, but the

term itself doesn’t convey much information from a security perspective. You know that you run a business out of your home, but many people might not. Consequently, simply saying

that you need a home security solution is more likely to produce an inadequate solution than a

solution that truly provides the security you need. In fact, until you take time to define what you truly expect from a home security solution, you don’t have much chance at all of achieving good results. That’s what this first chapter considers. Instead of the usual introduction, this chapter

digs right in and helps you define what you expect from a security solution. Understanding home security needs requires more than saying you want protection. You need to define what you want to protect, how you'd protect it, the risks the security system will face,

and the hurdles you want to overcome. In addition, you need to consider cost. Not everyone needs a high-priced security system. Sometimes, less expensive solutions work just as well as the high-priced model. You also need to consider specific technologies. For example, many

physical solutions provide great security. However, you might want to add electrical devices and electronics. You might even want to consider hiring a third party to help with your security solution. But you won't achieve your goals until you define all of the requirements for the security system.

Chapter 1

If you're buying a new home, you might want to ask about the security features that

the builder plans to include. Many new homes come with security systems installed. If you think the new security system won't meet your needs, you should work with the builder as early as possible to overcome any problems. Instead of paying full price for a security system, you may find that you pay only an upgrade fee for the additional features.

DEFINING HOME SECURITY Home security is a state in which you re safe and you can protect your property. Self-protection

always comes before property protection, but a good security system lets you accomplish both goals with relative ease. It’s possible to achieve these goals using a number of techniques. For example, it doesn’t matter whether you provide a means of keeping a burglar at bay or scare the

burglar away—both techniques keep you and your property safe.

In addition to keeping you and your property safe, it’s important for a security system to tell you about possible problems and to indicate a source of problems when a break-in occurs. Monitoring is more than simply a means of telling the police about the intruder who broke into your home; a

monitoring system can also tell you about the neighbor who is damaging your property at night or using your property to escape detection of illegal activities. The following sections describe five levels of security that you can use to achieve both primary and secondary security goals. Protection

The level of protection you provide determines the ability of your home to keep an intruder at bay. The protection level also determines the system’s ability to keep you safe after a break-in occurs. A good level of protection includes physical access deterrents such as locks and window

bars. A better level of protection includes both physical barriers and electronic aids such as alarms. The best level of protection includes both physical and electronic aids, plus outside assis-

tance. For example, you might connect the alarm system to a security company that calls the police to investigate or sends security personnel to your home to provide required assistance. Determent

The determent you provide as part of your security plan determines how often you'll scare an 20

Understanding Your Home Security Needs

The

National

Security

Institute's

Security

Resource

Net page at http://nsi.org/ Personal.html provides a smorgasbord of valuable tips and hints on personal security. The information changes regularly, so you'll want to check this Web site often.

intruder away before any access occurs. A good level of determent relies on outside lighting and clearing places, such as bushes next to the house, where a burglar can hide. A better level of determent adds visible monitoring, which includes forming a neighborhood watch program or other

visible program for keeping crime under control. The best level of determent includes external lighting, visible third-party monitoring (such as a security company), and electronic aids such as

automatic lighting. Burglars tend not to like having lights turn on without any reason at all. Monitoring

You use monitoring to detect possible intruders and to identify intruders before and after a break-in occurs. Monitoring also lets you track activities on your property outside the confines of your home. Unlike the visible monitoring that you use as a deterrent, monitoring in this case is

covert; you don’t want the intruder to realize that this protection is in place. An intruder who's

aware of your monitoring equipment will change his behavior to avoid it. For example, the intruder could rely on a ski mask to hide facial features.

Monitoring generally takes two forms: cameras and other detectors. A good level of monitoring includes standard video monitors placed in locations that provide a high-quality view of all entrances to your home. A better level of monitoring includes both audio and video monitoring.

At this level, you'll normally use high-quality cameras to ensure you see everything possible. The best level of monitoring includes heat sensors, breaking glass detectors, and other special moni-

toring equipment. This level of monitoring could include dedicated connections to security com-

panies and Internet connections that allow you to check your home while at work. In some cases, monitoring includes both internal and external video cameras and other equipment. Outside Assistance

The availability of outside assistance determines your ability to get help when an emergency

occurs. Outside assistance affects security directly, but it also lets you obtain help when other 21

Chapter1

avoid revenge as a motivation for attacking an intruder. Even though you may be tempted to exact revenge for the discomfort of an intrusion, it's better to avoid any contact with the intruder. Think about saving your life first, and let law enforceSavy homeowners

ment take care of the intruder later.

incidents occur. For example, having good access to outside assistance is helpful when you have an accident and can’t obtain help using the standard methods. The level of outside assistance you require depends on personal needs. Someone with special

needs will require additional outside assistance in many cases. For example, someone with limited mobility might require a wall-mounted or personally accessible device to signal the need for help. An outside assistance device need not be specialized. A cellular telephone works fine, in many cases, for fulfilling the outside assistance requirement. The point is to have some form of

outside assistance provided as part of your home security plan. Self-Defense

Providing self-defense as part of your security plans means having the ability to do something about intruders when no other course of action is available. Generally, this is your last line of

defense when every other part of your security plan fails. Self-defense doesn’t necessarily mean harming your attacker. In fact, you have four levels of self-defense from which to choose: ¢ Escape: Using another route to leave your home or using a hidden safe room within your home.

¢ Deception: Persuading your attacker that you’re somewhere you aren't or indicating that help has arrived, even if it hasn't. e

Better target: Giving your attacker another interesting target, such as an open safe or

jewelry box, while you make your escape.

e Physical harm: Disabling your attacker using any of a number of means including Mace,

guns, knives, or dogs. In many cases, you might want to take a self-defense course, such as the martial arts, instead of relying on these other methods of self-defense. A good self-defense protects you without considering the attacker. Many places restrict your use of guns as a means of self-defense, but you can often obtain access to Mace or other nonlethal alter22

Understanding Your Home Security Needs

natives by taking an approved training course. A better self-defense lets you disable or deceive your attacker without causing physical harm. The best self-defense helps you defend yourself without interacting with your attacker—you simply evade the attacker while getting to a safe location.

DECIDING WHAT You WANT To PRoTECT To create a comprehensive home security plan, you need to decide what you want to protect. A

home security plan doesn’t always protect the obvious. For example, a painting you own might not have very much intrinsic value, but it may have a lot of sentimental value. Protecting the painting is important because it means something special. Of course, you'll protect the obvious too. It's most important to protect your person, but you'll also want to protect your pets, goods,

and even the home environment. Personal Protection

Personal protection covers a lot of ground in any well-defined home security plan. The security plan you create should include specific goals and describe how to accomplish those goals. A written security plan is always better than something you figure out and then promptly forget. Many security aids described in this book rely on consistent application, which means you have to write

a procedure for using them if the vendor doesn’t supply one. For example, an alarm is useless if you forget to use it consistently by setting it whenever you leave your home.

Protection doesn’t mean just keeping someone from hurting you or providing a means of getting outside help when an accident occurs. You also need to consider a wealth of other unexpected occurrences. A fire extinguisher placed near the stove provides a measure of assistive personal

As you add more items to your list, the cost of your home security package increases.

In some

cases, this means that you'll have to make choices. You might need to choose a good level of security for your home as a whole, a better level of security for areas that contain valuables, and the best level of security for areas that affect personal safety. In some situations you may rearrange your home to make your security plan work at a lower cost or decide that it will simply cost too much to protect some items at a very detailed level.

23

Chapter 1

Some companies specialize in personal-protection packages. In many cases, you can get packages that provide a specific level of protection. For example, the Safety and Security Center at www.safetyandsecuritycenter.com/personalsafety.html offers a number of per-

sonal protection packages. You can choose the level of protection that you want. Another place to

look is AllSecureSafety.com (http://members.shaw.ca/securesafety/). Personal protection takes on another meaning in this case; this Web site specializes in everything from carbon monoxide detectors to first aid kits.

protection. The smoke and carbon monoxide detectors in your home also provide a level of personal protection in the form of threat detection. Intruders don’t necessarily start outside and

work their way in; sometimes the internal threat is the most important. You can divide personal protection into several areas: physical, financial, environmental, and psychological.

¢ Physical protection includes items such as keeping intruders at bay or reducing the risk

of fire in your home. Anything that can harm you personally is a physical threat that you need to consider in your security plan. ¢ Financial protection doesn’t appear in this book, but you should consider it as part of your security plan. Identity and other forms of theft are on the rise. The Wells Fargo checklist at www.wellsfargo.com/privacy_security/fraud_prevention/checklist.jhtml

can

provide you with additional information on this topic.

¢ Environmental protection means

keeping your home

and surrounding area safe.

Someone lurking in your backyard doesn’t necessarily represent a physical threat but can make you feel less secure.

¢ Psychological protection is mental well-being. For example, your security plan should include testing and cleaning cycles so that you know the home security equipment you rely on is actually working. You may decide to protect all, or just some, of these areas when you create a security plan. It’s

important to remember that every additional layer of protection also reduces the money you have available for other home security aids. 24

Understanding Your Home Security Needs

Don't always assume that your pet is the one to protect. Most intruders would rather see a nice alarm in a house than a barking dog. The dog doesn’t necessarily have to weigh in at two hundred pounds of raging flesh to do the job either. All you really need is a dog with

a convincing bark. An intruder will think twice before taking on a dog; a simple bark might be all you need to convince an intruder to go elsewhere.

Pets and Children

The concern when installing a security system isn’t just protecting your pet or child but making the alarm system work with your pet or child to prevent false alarms. When you consider what to protect, you must also consider problems you must overcome with that protection. A cat will climb around on furniture, making it difficult to implement a security solution that includes

motion detectors. A child will wander around at night, making it hard to implement many security solutions, including motion detectors. To protect both the cat or child and the valuables in your home, you might have to restrict the valuables to one very secure room and keep everyone out of that room. Goods

Your home is always in danger from intruders, which means that your goods are also likely to suffer some level of damage during an intrusion. However, not all means of accessing your home are

equally

problematic.

According

to

a National

Burglar

and

Fire

Alarm

Association

(www.alarm.org/) study, intruders are most likely to use these entry points to your home. ¢ Front door, 34 percent

e First-floor window, 23 percent e Back door, 22 percent e

Garage, 9 percent

e

Basement, 4 percent

¢ Unlocked entrance, 4 percent e Storage area, 2 percent

e Second floor, 2 percent 25

Chapter1

When you come home and find the door unlocked [yet know that you locked it before you left), don’t enter the house. Call law enforcement first and tell them about your suspicions. Making law enforcement aware of a potential problem is always better than walking in on an intruder.

Although the best level of protection requires that you provide some protection for every entrance

to your home, you don’t have to provide full protection for every entrance. A good level of security might simply provide good locks for the second floor. A better level of security might rely on alarms for the second floor as well but not use the expensive motion detectors employed on the first floor. The interesting statistic in this list is that 4 percent of the entries occurred from unlocked entrances. This statistic shows that intruders really do check your doors and windows for easy

entry, so you should check them too. Some people only check for open locks before they leave home. Savvy home dwellers check them again when they get home. Make sure the locks you

install work just as well when you're home as when you're away. Environment

Protecting your environment serves two purposes. First, it provides additional peace of mind.

You now have a larger area of protection and additional opportunities to keep intruders at bay. Second, environmental protection keeps your outside goods safe. A bush or shrub might not

seem particularly valuable, but replacing it can be quite expensive. You have to consider not only the price of the plant but also the time required to maintain the new plant. Unfortunately, environmental protection is more expensive than any other form of protection

because it covers a larger space that you can’t control very well. For example, motion detectors are useless in an area where wildlife could trigger an alarm. Yes, you can still use a motion detector or heat sensor to trigger lights that will potentially scare an intruder away, but the police will quickly tire of answering calls caused by the local squirrel.

Sometimes it pays to determine just how much environmental protection you can afford. For example, having automatic lights that detect infrared (body heat), motion, or sound (or all three) can provide a great deterrent. Intruders normally won’t want to have their activities highlighted 26

Understanding Your Home Security Needs

by lighting. You don’t need to provide the extra lighting throughout your property; usually it is enough to light the periphery of your home along with any paths you plan to keep safe. DETERMINING WHAT KIND OF SysTEM You NEED

Defining your home security requirements and determining precisely what you want to protect is a good start, but it’s not the end of the planning process. Not every home has the same secu-

rity needs. A simple home system might only provide robust physical security with a few sensors. However, a home-office scenario requires a lot more because you're in the house working all day.

A vacation home in the woods has yet another set of priorities that you must meet. The following sections describe different types of home security setups. Simple Home Security

The simple home security system provides for the needs of someone who doesn’t live in a highcrime area, has moderately priced items, and doesn’t have a home office. In fact, many people

have this kind of home setup. They leave for work each morning and come home each evening. Although these homeowners doesn’t necessarily work Monday through Friday, they often do. It might seem that the risk of home intrusion or burglary is very small for the typical homeowner,

but it’s actually relatively high. Because homeowners in this group don’t have a lot of crime in their area, the police might patrol less often. The fact that the homeowner leaves and comes home at regular intervals means the intruder doesn’t have to guess about the best time to attack. An intruder is very likely to choose a daytime entrance to ensure the homeowner isn’t around; unless the intruder wants to perform a home invasion, it’s beneficial to keep the homeowner out of the picture. Even though people in this group don’t have the most expensive property, it’s valu-

able enough to attract attention. In addition, moderately priced goods are easier to sell on the black market because they're relatively common.

Good Home Security A good home security setup always includes some type of alarm system. Even if you rely on a local alarm (one where the alarm sounds locally), rather than a central station monitoring facility (CSMF), the alarm will provide an alert that someone has attempted to gain entry to the house. Along with a modest alarm system that monitors windows and doors, a good home security sys-

tem includes some form of determent. You can use lights that turn on automatically when they 27

Door lights are controtled by a manual switch.

Window lights are controlled by an automatic switch.

Bathroom

10' 0" x.8 0”

Master Bedroom

20'6"x 18’ 6"

He

‘S)

1910"Xp x 196EBS

Closet 20' 6" x 29°

Pantry §'0"x 70" ‘S)Ww z

19' 0" x 12' 0° by

;1

Dining Room

f

7

Kitchen

Aes

fe

:

es

i

(

A.

Fig. 1-1. A simple home security system includes both an alarm setup and external deterrents. Figure created by author.

28

Understanding Your Home Security Needs

detect noise, sense motion, or identify an infrared heat source. However, you don’t always have

to provide electronic determent; a dog with a loud enough bark will turn intruders away as well. If you don’t have a dog, you can always use a dog substitute. Barking-dog alarms such as the one

found on the Do It Yourself Security site at www.youdoitsecurity.com/K9-dog.asp make it appear that you have a dog in the home, even when you don't. This system normally relies on a motion detector or a manually activated switch to start the dog bark, so the dog isn’t barking all of the time. Figure 1-1 shows a typical layout. The home in figure 1-1 has plenty of lighting, especially in the back of the house. The lighting is near windows so the homeowner can see everything around that window. The window lights are

all automatic; they turn on when some external stimulus provides a reason for them to light. The door lights are manual. You turn them on when someone requests entry. Notice that the front door

includes two small windows you can use to see outside—a must to ensure that the person you see through the peephole isn’t hiding others. An external keypad indicates to intruders that the security sign outside the door is real. (You can buy the security vendor signs from eBay and other

online venues, so many intruders disregard them unless they see other signs of an alarm system.)

Any home security system should also include some means of getting outside help and some

means of escape. Buying inexpensive cellular telephones—the kind you can either throw out or add minutes to—can provide everything you need to get outside help. However, because you have to speak into the telephone and not simply press a button, you can give your position away to the intruder. An escape plan can include everything from running to a neighbor's house to

putting a stout lock on the bathroom door. Creating a safe room in your home is always a good idea, especially if you live in an area where inclement weather can prevent the use of other escape techniques. The home in figure 1-1 has a pantry with a stout door; this safe room is out-

side the normal path that an intruder would probably use, making it even better than the bathroom, which is in the bedroom and has a window. Better Home

Security

The home shown in figure 1-1 is nicely protected, but you can easily add a few items to make it safer. Notice that some windows don’t have a latch switch for the alarm. These picture windows don’t open, so you might assume

that they're safe. However,

intruders don’t always act as

expected. Smashing the window might make sense if the intruder knows you aren't home (or the

intruder simply doesn’t care). Adding a glass break sensor can make it harder for the intruder to get in—at least through the windows. 29.

Chapter 1

Another problem with this setup is that the alarm control is in plain view. Hiding the alarm control in the bedroom closet has several benefits. First, an intruder is less likely to find it, which means

turning it off is going to be a lot harder. Second, this home is set up self-contained environment during the evening hours. Placing the means that you can add motion detectors to other parts of the house them off. In the morning, you simply turn off the motion detectors

so that the bedroom provides a alarm control in the bedroom without worrying about setting from the bedroom before you

enter the rest of the house.

The better home security plan also includes motion detectors. Looking at the floor plan in figure 1-1 again, the best places to put motion detectors are in the kitchen and the living room because

they both have entrances that lead out of the house. You could also put motion detectors in the dining room to provide better coverage. Obviously, you wouldn’t want to put motion detectors in the bedroom—you need somewhere to sleep.

All of this additional security isn’t worth much if you don’t include CSMF in your plans. Centralized monitoring from another location is extremely important in this case. If the vendor you choose provides it, you might also want to include fire and carbon monoxide monitoring as

part of the package. This added protection makes it less likely that a fire in your home will go undiscovered. Many people die when smoke overcomes them. Even more dangerous, carbon monoxide can go unnoticed for weeks. You can learn more about carbon monoxide poisoning symptoms at www.carbon-monoxide-poisoning.com/symptoms.html. Best Home Security

Obviously, there are no limits when it comes to the best level of home security. You can add anything you want to the system to feel more secure. However, you don’t always gain very much by adding every possible security feature to your home. It’s important to weigh the cost of the additional security against the cost of the items you want to protect. Some home additions really are helpful. For example, adding surveillance cameras lets you monitor your home. In addition, you can attach a surveillance camera to a recorder so that everything

it sees while you're gone is available to police. One of the more interesting ways to use a camera is shown in figure 1-2. You combine a camera with the keypad. People coming to the door get their picture taken. Figure 1-2 contains a number

of other interesting features. The breaking glass monitor is mounted on an internal, not an external, wall. Insulation in an external wall can interfere with 30

Bathroom 10' 0" x 8' 0"

Living Room The breaking glass monitor detects sound. i

19'0" x 19'6"

20' 6" x 16' 6"

.

Maintain a muftimode monitor in your bedroom to make surveillance easy at night.

Closet 20' 6" x 2' 9"

> O77O

Dining Room

19! 0" x 12' 0"

:

14' 0" x 12' 0”

BS >eorxas

S| Use fixed cameras when possible to keep costs down.

Cameras with pitch, itt, and zoom fet you see better intight areas,

Fig. 1-2. Effective use of cameras keeps costs down and provides a deterrent factor. Figure created by author.

31

Chapter 1

the effectiveness of the audio version of this sensor. In addition, using the setup shown in the figure makes running the wiring less difficult. You can also use wireless devices, but many security professionals warn against them because they're far less reliable. Creating a plan that makes wiring less obtrusive and still maintains the effectiveness of the sensors is a better choice. A breaking glass sensor is only effective for one room, so you need one sensor for every room that you want to monitor.

This house uses a number of carefully placed video cameras. Some of the cameras are fixed,

which means they look at one position all of the time. You'll want to adjust the camera using targets when working with a fixed setup. The advantage of fixed cameras is price; they're less expensive to purchase, install, and maintain. Locations near doorways include a camera with pitch, tilt,

and zoom. This setup is more expensive but lets you see who’s at the door and who might be lurk-

ing beyond by changing the camera position as needed. Notice that this setup places a number of cameras near the front of the house and at the back door. The reason for using this setup is that it acts as a deterrent. Intruders are less likely to attempt entry at a house where they see monitoring equipment.

The cameras feed three locations, two by the doors and one in the bedroom, for nighttime surveillance. The bedroom monitor is multimodal. You use it to access not only the cameras but also the status of the various internal sensors.

Home with Small Office

The small office / home office (SOHO) environment has received a lot of attention during the past few years because many people now work at home. From one perspective, having an office at home

actually reduces the chance of an intruder taking interest—especially if you don’t leave the office very often. Intruders characteristically prefer that the homeowner be gone at the time of the intrusion. However, your home is also much more attractive to many intruders because you have intellectual property to offer, client lists, office equipment, and everything else that goes with having a

home office. When an intruder can ensure that you won't be home to protect your goods, a home office becomes very attractive. Obviously, you'll want to take some extra precautions when working out of your home. For exam-

ple, it’s usually a good idea not to advertise your departure; don’t tell people that you'll be gone on vacation unless you have to. Make sure you provide additional physical and electronic secu32

Understanding Your Home Security Needs

Don't forget the small parts of your security plan. For example, keeping your office Safe at the expense of your data is never a good trade-off. Arrange your security around your high-value materials first, and then move down through the list of items you want to protect. Because your data is your business, you should always protect it first and everything else

later. A small office should provide offsite tape-backup storage at an employee’s home, a bank’s safe deposit box, or other secure location. Don’t store your backup data at your home because fire, flood, or other disaster will destroy both copies.

rity for your home as well. Finally, you might want to hire a reliable house sitter, someone you

know and trust, to provide the appearance of your presence while gone.

The main difference between a standard home and one with a home office is the office. Placing the home office on the second floor can help reduce risks to all of the equipment you own. The basement is the next best option. Placing the home office on the first floor in a room with lots of windows is probably the worst choice from a security perspective. The following sections consider some of the features you can add to the office to make it more secure.

Good Small-Office Security When you protect your home well, you don’t have to add a lot of security to your office, especially if it is on the second floor. Make sure you provide adequate physical security. A lock on your office door (and using a door that will actually delay intruders) can help significantly. Consider

physical security for your office equipment as well. Companies such as Secuready (www.secuready.com/) provide physical security solutions you should consider adding to your office setup. Even though these systems don’t prevent theft, they further delay any intruder

interested in stealing your office equipment.

Make sure you include motion detectors and an internal camera for every room of your office. Recording any intrusion is extremely important. You need the recording not only for the police

(and eventual capture of the intruder) but also for your insurance company. You generally have to prove that someone stole your equipment to ensure prompt payment by the insurance company. Because your office is a public part of your house, the internal camera is less of a concern

in this area than in private areas of your house. However, it still isn’t a good idea to make this camera Internet accessible. 33

Chapter 1 e s Dc

TTTZaire

amEDURES IRDDatain manana

Doug Bentley has been an insurance agent for nineteen years and has worked with a wide variety of clients. During that time, he has

worked with a number of clients who've installed various kinds of home security systems. | met with Doug to obtain his insights on alarm systems from an insurance perspective. One of the concepts that Doug emphasized several times during the interview is that

home security systems, like insurance, offer the homeowner peace

of mind. (Photograph used by permission of Doug Bentley.}

What are the insurance benefits of getting a home security system installed?

There are two distinct benefits. One of them is that the insurance premium will be discounted. The second benefit is that the security system will prevent (or at least reduce] insurance claims.

How much can someone save by installing a home security solution? My particular company for a central station alarm system will discount the premium 5 percent. The insurance premiums arent a very high dollar amount in many cases—it varies by

state. The savings on a $400 or $500 premium aren't going to make someone go out and buy a security system. (The savings for a $500 premium are $25 per year.) The savings will pay for the improvement over a number of years. My company also offers a 3 percent discount for a local alarm where the bells and lights go off just on the property.

Are there particular benefits of a home security system for someone with a home office? | think that it's more of the same. You have more justification if you're dealing with intellec-

tual properties, client lists, trade secrets, things like that. Not only do you have the potential of someone stealing the heirlooms, jewelry, and the silver, but also the business property as well. If you have a home office, it might put you more at risk because more

people will come and go to see what's available. | have twenty or thirty people a week through this office. If |were running my insurance agency out of my home, it would be the

same number of visits. Some people are just coming in to talk with me the first time, so | can see that | might be advertising, “Hey, look at what's here.” An intruder would have

more of an opportunity and | would introduce people to my goods, as opposed to having a home [where only a few select people stop by for a visit]. Of course, it depends on your business. You might never be away from home or have peo-

34

NE Stan Ging Your YOUr Home Frome Security Security Understanding

Needs Needs

ple over to visit. The house may never be empty for weeks at a time, which would reduce your risk substantially.

. Do home security systems work well for people who live in remote or secluded areas? The central station alarms that rely on the telephone lines probably work as well out of — town as they do in town. The one thing that would have to be taken into account is response time. If you're ten or twelve miles from the fire department on the end of a gravel

_ road that never gets plowed and they get the fire alarm, the response time won't be the same as for the house that’s two blocks from the fire station. In addition, here in town the telephone lines and power lines are underground now. That's the legal requirement for all of the new subdivisions. So we don't have, in a windstorm or

lightning storm, the tree branch knocking down the telephone lines or the power lines, which

would negate the effectiveness of the alarm system. _ Do you recommend a whole-house security solution, or do you prefer to see security solutions that emphasize particular areas?

A system that emphasizes particular areas is better. that Show many houses are set up. The living room, dining room, and other first-floor areas are set up with the motion detec| tors. One room is set up to keep a pet during the day. The whole second level of the home has fire detectors, but not the motion detectors, so the homeowner can wander around in

the bedroom areas without any problem. Insurance companies don't differentiate between

houses that have a full solution versus a partial solution because the whole house is protected for fire and all the doors and windows are wired for break-in. Doiinsurance agents prefer to see professionally installed systems or do-it-a

oO

tions, and why? | can only speak from my pereanal point of view. Our company doesn't have any guidelines regarding personally installed versus professionally installed systems. From my own point of view, | don't do my own dentistry, | don’t do my own haircuts, | pay people who are experts to perform these tasks. Personally, if | had a security system, | would feel more

comfortable if | had it professionally installed. Older homes can be a nightmare. They can _ have older cotton-wrapped wires in the attic with porcelain standoffs that a do-it-yourselfer might not handle properly.

_Of course, the one that works is a good security system. If you're an electronic guy and you don't have any problems with it, then it’s fine to do it yourself. If you're like me and you don’t have the required skills, you should hire someone to do the installation.

35

Chapter 1

Do you feel that home security solutions should also include personal assistance? For

example, someone falls and uses a call button to receive help? My answer is that it depends on the circumstance. The basic security system provides the infrastructure. The panic button or necklace is just another piece of hardware that you can buy and add on to the security system. You're going to be partway there anyway, so you can

determine later if it’s in your best interest to have these features. For the elderly person or someone who is alone in the house, these features make sense. How would you rate the following home security goals and their importance from an insur-

ance perspective? First, Peace of mind {| want to keep the burglar at bay using a combination of electronic

and physical security). The biggest advantage or payback is that you can sleep at night. You can rest assured that if you're not there and a fire starts that the fire department is going to get notified. It gives

you the peace of mind. That’s the thing that comes to me. It’s the same thing that | offer to my clients—the idea that the insurance gives them the peace of mind. The protection, the deterrent, the monitoring, and the different things like that are fine, and hopefully they'll never be used, but what [you] will notice the very first night is that you can turn off the lights and go to sleep and not worry. Second, determent (I want to scare an intruder away).

From a personal point of view, | buy into determent 100 percent. Using motion detectors and external lights can reduce the aggravation of outside activity. The neighbors will even tell you that someone was outside your house because they see the lights go on at night.

36

Understanding Your Home Security Needs

The one distinction you want to avoid for a home office is making its location apparent from the outside. One of my clients had placed bars only on the office windows. Anyone standing outside the house could determine the office’s location immediately based solely on the presence of the window bars. If you want to add a feature such as window bars, add them through-

out the house so that the office location isn’t obvious.

When your small office is located outside your home, make sure you consider the potential problems on all sides of the office. For example, some intruders will actually use the ceiling as a point

of entry to avoid enter through a assume that the potential access

security devices in a small office. Intruders will also rent the office next door and wall during the weekend or other downtime for your office. Consequently, don’t doors and the windows are the only access points—make sure you cover every point.

Don’t miss cheap security features. Keeping the lights on in your office will increase your electrical bill, but it will also reduce the risk of nighttime intrusion. Make sure you keep the drapes open at night as well. The open window will make any intrusion visible to law enforcement patrolling the area. In fact, passers-by seeing irregular activity are likely to report it to law

enforcement.

Better Small-Office Security

Adding physical and electronic security to your home office is a great start. However, you can do more to make your home office less attractive to intruders. One way to protect your equipment

is to engage in asset hiding. If you use a server to store your data, you can reduce your risk by hiding the server in a closet behind a false panel. Make sure you provide enough ventilation for the server and find a means of hiding the cables going to the server as well. An intruder is going to look for assets in plain view, even those that are in the closet, but is unlikely to look for items

hidden by something as simple as a false panel. When you look into asset hiding, make sure you avoid hiding items that you need every day or that aren't high-priority targets. For example, you don’t need to access your server every day if you leave it on 24/7, so hiding the server makes sense. But attempting to hide your workstation doesn’t make sense. An intruder will know that something’s wrong if you own a business that relies on computers and there aren’t any computers in sight. However, you can reduce your risk by ensuring that 37

Chapter1

your workstation only has the operating system and any applications installed. Keep your data on your hidden server.

Best Small-Office Security As with home security, you can go to extremes with office security. Depending on how much you have to lose, your business could warrant extreme protection. However, sometimes it’s more a mat-

ter of how you set up security than how much money you spend on it. For example, by combining multiple sensor types, you can double or triple the effectiveness of a security setup. You can use both shock and audio breaking glass detectors to make it less likely that your security system will miss this event. Motion detectors come in infrared, ultraviolet, and microwave versions—each of which has its own advantages and vulnerabilities (chapters 4 and 5 consider these issues in detail). Home with High-Priced Valuables

A home with high-priced valuables is likely to encounter a few problems not found in other environments, especially if others know about the valuables. Generally, you should follow the guide-

lines found in the “Best Home Security” section of the chapter to protect your home as a whole.

The goods require additional protection in most cases—not the least of which is added insurance.

Make sure your insurance policy specifically mentions the high-priced valuables individually and assigns a price to each one. In addition, keep records on these items and build a picture or video

library of them. In short, assume that someone is going to steal them. You can reduce your risks by placing your valuables in a central location in your home, preferably in a room without windows and with limited access through doors. A good level of additional security includes placing the valuables in a safe when possible. The safe room should also include additional battery-backed sensors to ensure that an intruder has a harder time circumventing the

security you have in place. Make sure the alarm system you choose is also battery backed and uses both telephone and radio communications. The addition of radio communication reduces the chance that the intruder can overcome the system simply by cutting the telephone line.

If you have enough high-priced items, get the assistance of a knowledgeable and reliable security

company. This book doesn’t discuss the exotic security solutions that these companies employ, although many of the ideas and concepts are the same. The bottom line is that if you have enough high-priced valuables to cause concer, you should get a custom security solution designed specifically for your needs. 38

Understanding Your Home Security Needs

Secluded or Remote Area

Everyone likes to get away from it all. Secluded and remote areas provide a sense of privacy that most people find relaxing. If your remote- or secluded-area house is in a small town, you get all of the benefits that a small-town environment can provide as well. However, you also need to con-

sider some of the negative aspects about living too far from civilization. The following sections describe some additional precautions you should take with a home in a secluded or remote area. Good Secluded- or Remote-Area Security

A local alarm is never a security option in a remote or secluded area. The potential for someone hearing and reacting to such an alarm is extremely small. Be sure to use a monitoring company that

will not only call law enforcement or the fire department but also notify you of any problems. One of the biggest problems in remote or secluded areas is response time. It’s not very helpful to have an alarm system built into your home if it takes the fire department or police an hour to reach it. If your monitoring company adds to that delay, then you really have problems. Obviously, the

top priority is to ensure the alarm goes on about any problems you might have as soon as possible. Depending on the value of your property, you might want to pay extra for someone who lives nearby to look in on any problems that the security system detects. Rural properties also have a number of problems that you simply don’t need to consider in an urban environment. For example, these homes rely on a number of pumps to keep things tidy. A

leaking pipe won't attract any attention at all because your home has its own well pump. Consequently, a home in a rural area needs additional sensors to detect problems such as a sud-

den rise in water in the basement or the presence of unfriendly gases in the home.

When working with a CSMF, you pay a subscription fee, normally monthly. When an

intruder triggers the local alarm, a remote alarm sounds in the alarm company’s office and the company will call the police. The cost for a subscription service varies widely, and you'll need to contact local companies for details. Looking online, you can find a range of costs. For example, the A&E Security page at www.aesecurity.com/monitor.htm lists a price of $15.95 per

month at the time of this writing—one of the lowest prices you'll find. You also have to look at precisely what the company offers. Chapter 2 tells you more about selecting a security vendor. en

nc

eeeettdtEEddEEISSSEEnS Ss

f

39

Chapter 1

Better Secluded- or Remote-Area Security Once you get past the basics in secluded- or remote-area security, you can concentrate on better

detection techniques. Because you want to increase the time that law enforcement has to respond,

you'll want to add both external cameras and intrusion detectors. However, you can't use a motion detector in a rural area. Even if you get a motion detector that has an offset for animals of a certain size, deer and other large animals will set it off. You don’t want to pay for all of the potential

false alarms that could occur. Most security experts define four kinds of sensors that are usable in an outdoor setting: * Video motion detection sensors: These sensors rely on a closed-circuit television tied into a computer system. The computer system analyzes differences in the input video to detect motion and determines the motion type. Low-end systems only detect motion, but better

systems include programming that can eliminate certain types of intruders, including animals. However, this system requires monitoring, so it might not be the best choice for a

vacation home.

¢ Volumetric sensors: These sensors generate an invisible field. When an intruder breaks the field, the sensor sends an alarm. Depending on the technology, the volumetric sensor can eliminate many false alarms based on the size of the intruder, but deer and other large ani-

mals still easily fool the sensor. You generally use these sensors where little or no traffic is expected. ¢ Barrier sensors: These sensors often rely on multiple inputs to detect an intruder. The combination of sensors reduces the risk of false alarms. For example, a taut-wire system

generates a capacitive field that the intruder must break as the first detection. The second detection comes from strain gauges attached to the wire. An intruder that places any strain on the wire at all, while breaking the capacitive field, will cause an alarm.

e Fence- and wall-mounted sensors: These sensors detect an intruder breaking a field or

causing vibration. For example, you could use it to detect someone climbing a fence or wall through the vibration that the action causes. The best sensors can detect the difference between an animal rubbing against the fence and a human climbing it. The kind of sensor you choose depends on the kind of response you need. In most cases, secluded areas receive the best response from video motion detection sensors or volumetric sensors in less-

traveled areas. Rural settings generally get the best input from barrier sensors but can benefit from fence- or wall-mounted sensors as well. You must combine these sensors with some type of video motion detection sensor for best effect. However, you should provide some type of human 40

Understanding Your Home Security Needs

Some

vendors

offer products that let you monitor your home’s security via the Internet. In many cases, you can see what's going on at your house while you're away. The problem with these systems is that a determined intruder can break into them without your knowledge. Any system you can access from the Internet, an intruder can access as well. When you use a system like this, pay careful attention to the security of the Internet connection and carefully place any sensors that can be accessed from the Internet. You don’t want a security bonus to turn

into a security liability.

verification in both cases (using video cameras if possible) to ensure that the alarm is real before contacting police. Best Secluded- or Remote-Area Security

Depending on the size of your rural home, you can resort to some fairly esoteric and exotic security solutions. For example, SEI has a solution that will detect a man walking up to six miles away

(www.seistl.com/perimeter/perimeter_security.htm). Obviously, your need for such a long-range

solution depends on what you want to protect.

Many people are aware of the role the Internet plays in information today. It’s common to see security vendors discuss new setups that let you monitor your home using an Internet connection. In some respects, these systems add to your risk when compromised, but in other respects,

they make monitoring your property a lot easier, especially when you only visit it during vacation. At least one security professional has combined a number of technologies to come up with a unique monitor for remote locations. The system combines a road sensor and several external cameras. When someone drives on the homeowner's private road, the road sensor sends an alarm to the homeowner’s computer. A few clicks and the homeowner can see who has come up the road, even without being at home. Other additions to this system allow the homeowner to listen and respond from the remote location to anyone arriving at the front door, using a specialized speaker setup.

Urban High-Risk Environment

The urban high-risk environment is one where you have external risk factors such as an elevated crime rate to consider when creating a home security setup. You can’t always easily tell whether 4]

you live in such an area. However, checking with the police, fire department, and your insurance agent will usually tell you all you need to know. If you find that you live in a high-risk area, you need to find ways to reduce your personal risk. Simple changes, such as adding more lighting,

can make a big difference in how well your security system works. You also need to place special emphasis on protecting against the intruder who gets into the home because that is more likely to happen in a high-risk area. The following sections consider a few other ideas for maintaining a secure

home

in such an area.

Good High-Risk Security

The first idea that you should probably throw out is using a local alarm in a high-risk area. If this is a high-risk area, most people will ignore a local alarm. You need a CSMF to ensure that someone

is going to respond to the alarm. Be sure that the vendor you choose provides good service and that

you understand exactly what the vendor will do when an alarm sounds. Many vendors don’t guarantee they will contact law enforcement when an alarm sounds. Some vendors will send a security person to see what is happening before contacting the police when they find something wrong (at which point it’s usually too late).

Place an emphasis on physical security and recording the identity of the intruder. Any additional physical security that you provide will delay entrance. For example, placing heavy, functional bars on your windows will definitely delay the intruder. Recording the intruder as often as possible using separate cameras and recorders will ensure that at least one device will survive long enough to identify the intruder. This security system feature is your only hope of recovering the goods that the intruder takes and of letting the police apprehend the intruder.

Better High-Risk Security

Most security experts recommend using timers for lighting when you won't be home. Using timers at all times in a high-risk urban area is a good idea. Make sure the timers consider actual sunlight for both internal and external lighting. The external lights should go on every night at dusk. They should also go on when weather conditions make visibility uncertain. Replace bulbs

regularly and ensure that every area has at least two light sources to reduce the risk of a dark area from a bad bulb.

Use random timers for internal lighting. Random timers make it appear that you’re home. A timer that turns internal lighting on at the same time every evening makes your absence quite noticeable. The lighting for internal areas should also randomize rooms with the lights on. After all, you aren’t 42

Understanding Your Home Security Needs

in the same room at the same time every night, so the timer system has to duplicate your natural use of lighting.

Best High-Risk Security

Careful use of sensors can add to your home security in an urban area. The “Better Secluded- or Remote-Area Security” section of the chapter describes sensor types. Generally, if you want to

use a sensor setup in an urban area, you have to place it in a location that no one’s going to access regularly. A fence- or wall-mounted sensor system works well, but only when you can set the sensor to keep the number of false alarms to a minimum.

SETTING A SECURITY SYSTEM PRICE GOAL Setting a price on your security system is important. It’s very easy to get so involved in setting up

a new system that you start spending more than you can really afford. Security systems can become so expensive that you end up implementing your plans partially and not getting the comprehensive setup that you could have if you had set your sights a little lower. As part of your security setup, draw a floor plan of your house and work out the details of every security component. The floor plans in this chapter provide guidance on how to approach the problem, but as the

book progresses, you'll see additional floor plans with significantly more detail. Generally, a simple security system can cost as little as $99 but will probably cost more in the range of $240 for systems such as the Visonic Powermax Video Alarm (www.home-technology-store

.com/detail.aspxPID =1884). (Any prices in this chapter will likely change; make sure you check for current pricing.) Adding another motion detector will cost around $70, so the costs can add up

quickly. You don’t really have an upper limit on what you can spend on a security system, but many advanced systems that include everything from gate monitoring to driveway sensors cost $500,000 and more.

Once you think about a reasonable level of security hardware, you also need to consider the cost of

installation. Labor costs will consume a major portion of your budget if you get an outside contractor to perform the work instead of doing it yourself. Wireless systems cost a lot less to install than wired systems because the installer won’t have to run any cables. However, many security profes-

sionals also view wireless systems as inherently less reliable because it’s easy to interfere with their

functionality and some systems require that you replace batteries regularly. Depending on the kind of system you want to install, you might find that you have to use that company’s equipment. 43

Chapter 1

A major company such as ADT (www.adt.com/resi/) is most interested in selling you a monitored

system, so there’s a monthly cost added to the initial installation cost. A very basic ADT setup has a $249 installation price and a $32.99 monthly monitoring fee. More-advanced ADT systems (such as the one described in the “Better Home Security” section) start at $899 for installation and have a $37.99 monthly monitoring fee. Other vendors have similar prices; see chapter 2 for more details.

It’s important that you avoid another security trap. Many people view security systems as a commodity item, such as a television or refrigerator. However, you don’t simply install the hardware

and consider the mission accomplished. Security systems require regular maintenance that will cost you either time (if you do it yourself) or money (if you have someone else do it). An external camera requires cleaning, as do internal items such as motion detectors. Your sensors won't work

very well if they have dust on them. It’s also important to test the system regularly and replace batteries in wireless equipment. Anything with moving parts will likely require other kinds of main-

tenance, and you might need to apply software updates. In short, even if you install everything yourself and rely on a local alarm system, you still have to consider some maintenance costs. PHYSICAL SECURITY VERSUS ALARMS AND MONITORING It's easy to get the idea that home security is composed of good stout locks or relies on alarms and monitoring. In fact, a great home security system has both physical security, and alarms and monitoring. Some security professionals divide physical and electronic security into six layers, as shown in table 1-1.

UNDERSTANDING Home Security RISKS

Home security does pose a few risks. That's right; you take a risk by installing a home security system. It’s true that the risk you incur is less than the benefits you receive, but you need to consider them anyway. You can divide the risks into two areas. First, even if you install a security system, the

intruder can still succeed. Second, intruders often receive rights that many people feel run contrary

to common sense, so you need to consider the legal issues of installing a home security system. Determined Break-ins Always Succeed

At some point, you'll own a shiny new home security system. You may not only have peace of mind but a sudden infusion of a feeling of invincibility. It’s true that intruders are less likely to bother you 44

Table 1-1. Security Layers for Physical and Electronic Security a na he en rnercncnn everyone ncn tin mertr

nn Od

Security Layer Description Ce ee ee ae eres © PE

Deter

Detect

Delay

React

Detain

Record

The ability of the security system to keep an intruder from attempting access to your house is a primary consideration. A security system that can keep the intruder away reduces most other requirements and makes the security system pay for itself. Every time a security system scares the intruder away, you avoid having to fill out reams of paperwork and dealing with the loss of sentimental valuables.

X

X

Reaction measures how the system interprets an intrusion and defines what it will do to counteract the intrusion. For example, a motion detector can send a signal to the alarm system. A local alarm reacts by sounding sirens and flashing lights, while a monitored system might not react locally at all; it might simply alert the alarm company or call the Police.

pecining an intruder ultimately relies on co response of the police or security company personnel. However, a security system can include features to increase egress time for the intruder. The electronic part of the system can turn out the lights, making it hard for the intruder to see. Automatic doors can close and lock.

Electronic ERAN eehes

X

The measure of the security ectemi SsSbiiny oeassess a potential threat is important to the system’s overall functionality. This is the measure of the system’s ability to determine whether a threat is real and how well itavoids false alarms.

The Ability of the security eer ie.Keer the intruder from breaking into the house is an important part of the overall security strategy but isn’t an end goal. A determined intruder can break into any security system given enough time and resources; this feature defines the time required to perform the task.

pr

Physical MS RE

X

X

X

When an meadersgoes “into your nate and meres off with your goods, you want to ensure you have some hope of getting the goods back and catching the intruder. The only way you can do this is by recording information about the intruder. It isn’t simply a matter of recording the intruder’s face (although getting this information is important) but also of learning as much as possible about the intruder. Little pieces of information, such as what the intruder wore and how the intruder walks, can provide valuable information to

é law enforcement. e oe y cm eee ac a

Xx ene

45

Chapter 1

with a security system in place. However, a determined intruder is always going to get in, no mat-

ter what kind of security you have. Your security system can give you peace of mind because you'll know when a break-in occurs and can do something about it. The security system can even delay the intruder for a while. However, in the end, a determined intruder will break in and attempt to

steal your goods. With enough delays and smart moves on your part, though, law enforcement is more likely to catch the intruder. The bottom line is that you shouldn’t become complacent just because you have a security system in place; a security system doesn’t make your home a fortress. The statistics for a home security system are very good. Most online sources agree that an intruder is three to five times less likely to enter your home if he (or she) knows it has a home security system (which is why you want to make the home security system visible). However, law enforcement

often has a less favorable opinion. According to CBC News (www.cbc.ca/consumers/market/files/ home/break_in/alarmsystems.html), 96 percent of all alarm calls are false, making the officers a lit-

tle more complacent about answering an alarm without verification by the homeowner or a security professional. Yes, the alarm will trigger a response—it just might not be a very fast response. It's important to realize that security companies are in business for one purpose: to make money.

They don’t offer anything that doesn’t eventually end up making more money for them. That’s why you want to read your contract carefully and spend some time reviewing the company’s practices. For example, ADT

enjoys a good reputation, yet according to ConsumerAffairs.com

(www.consumeraffairs.com/homeowners/adt.htm), it’s a less-than-perfect reputation. What hap-

pens when an intruder breaks into your home is largely a matter of what the security company tells you in writing (don’t believe a word that the salesperson tells you). You need to purchase

home security services based on the knowledge that someone is going to test the security system. Home security systems can also aggravate the intruder. Some intruders know how to disable some systems—at least the less complex setups. The extra time and frustration often anger an

intruder, resulting in more damage to your home. Unfortunately, you won't find any statistics on this particular area online, and the security companies aren't talking. In short, having a cheap

home security system could backfire and actually cost you more money in the end, although the realistic chance of this happening is relatively small. Legal Problems

Depending on what course you choose for personal and home security, you can run into legal problems. Always begin any home security setup by asking law enforcement about your plans. Be sure 46

Understanding Your Home Security Needs

According to insurance agent Doug Bentley, if you keep any type of self-defense weapon in your home, you need to be sure that you have enough liability insurance to cover any injury an intruder might suffer. In addition, you should rely on self-defense only as a last measure, when the need for it is evident. Insurance companies won't cover any injury or other liability that arises from a self-determined act—one in which you acted when there wasn’t sufficient cause to prove self-defense. Most insurance companies do provide coverage when an act is demonstrably self-defense. Of course, you must also act in accordance with local laws and regulations to expect any support from your insurance company.

that your security plan is within the legal limits for your location. For example, many states have strict handgun laws that you need to observe in a home security scenario. Sometimes saying that your life was threatened isn’t sufficient to avoid legal entanglements. In fact, you’re generally better off finding another solution for personal protection. Running, hiding, getting outside help, and using nonlethal remedies are all better than relying on a handgun to solve an intrusion problem. (Many nonlethal remedies, such as using a Taser gun or Mace, require local licensing after taking a quali-

fied course on their use.)

When you do decide that having a handgun available is in your best interest (perhaps you live in a rural area where help is less available), make sure you take any required local gun-safety classes

and acquire any necessary permits. Take time to learn about local law and burden of proof

because once you shoot an intruder, it’s too late to do anything about the situation. For example, if you live in New Mexico, you could go to a course on concealed-handgun use like the one advertised on the Web site www.nmpistoltraining.com/nmcourse.htm.

Unfortunately, your legal problems don’t end with a choice of personal protection. Intruders rou-

tinely sue homeowners for injuries sustained while breaking into a home and win. This is the rea-

son that it’s so important to provide some measure of deterrence around your home. Scaring the intruder away is far better than any other course of action. Make sure you understand the laws in your community regarding use of the martial arts to protect yourself. Some communities consider use of the martial arts as bad as using a gun or Mace to

protect yourself, and you will suffer the consequences, rather than the intruder. In one story in the San Jose (Calif.) Mercury News, the homeowner actually killed the intruder (www.broward 47

Chapter 1

.com/mld/mercurynews/news/local/states/california/the_valley/10844749.htm). Getting martial arts training also opens you to all kinds of legal issues. For example, Legal Beagles (www.tafkac

.org/faq2k/legal_2007.html) discusses the issue of whether you have to register yourself as a deadly weapon. The last paragraph of this particular article is perhaps the most important. In one case, an intruder entered a home, shot the victim, and the court let the intruder free because the vic-

tim had martial arts training. The intruder pleaded self-defense and won. After you research this issue a little, you might conclude that avoiding the intruder at all costs is far better than being pre-

pared for a confrontation.

CREATING AN ESCAPE ROUTE PLAN As part of your security plan, you should create an escape-route plan as well. You should know how to get out of the house as quickly as possible when an emergency (such as a fire or other environmental concern) demands it. Every room should have an individual escape plan similar to the one

shown in figure 1-3 for the bedroom in the sample home. Make sure you post the escape-route plan in each room in a place that everyone can see. It’s important to test the escape plan as well. Your

local fire or police department can provide you with information on performing this task based on your specific requirements. Escape plans should also describe what to do when a break-in occurs. Never publish these plans or make them available to other people. No one outside the family should know where your safe room is or how you plan to secure it. However, you should write this plan down, provide a map to get to the safe room similar to the one in figure 1-3, and discuss it regularly with family members.

LeT’s START SECURING

The problems you face when you begin working on a home security solution include deciding what to protect and how to protect it and offsetting these needs with the cost involved. You need to decide between the good, better, and best solutions in each area to keep costs under control while

achieving your home security goals. Of course, those goals are personal—no one can really decide them for you, even though you can get third-party assistance to highlight your particular issues. It’s time for you to make some decisions based on the content in this chapter. For example, you'll want to decide how much, and what kind of, monitoring to add to your home. You'll want to 48

Bathroom

10’ 0" x 8'0"

Master Bedroom

20' 6" x 16' 6"

19’ 0" x 19° 6"

KO 6'0"

x

7'0"

Dining Room

19' 0" x 12' 0"

i

14’ 0" x 12'0"

Fig. 1-3. Provide escape routes for every room in the house and post the information so people can see it. Figure created by author.

49

Chapter 1

decide on what kind of self-defense measures to provide and create a plan for obtaining outside assistance. The goal, in all cases, is to create an environment where you remain safe, protect your

property, and give the police a very good chance of catching the intruder. You have a number of options for accomplishing the goals in this chapter. One is to have someone else do the work for you. Third-party installers and security companies can make the task of

implementing a home security system a lot easier. In addition, you can be sure that your installation will meet any required construction laws, as well as state and local laws, regarding home

security systems. Chapter 2 tells you more about these issues and helps you prepare to use a third-party installer or security firm.

50

CHOOSING A PRECONFIGURED SOLUTION

@ any people don’t want to spend time and effort running cables, installing hardware, and setting up a security system, so they hire a professional to do the work. It’s still important to

plan the security system, but having someone else do the actual work makes the job go faster, and you can be certain that the installation will meet any state, local, or insurance company requirements. The important consideration is whether the security system meets your requirements,

and that’s where the planning in chapter 1 comes into play. Always decide what you expect before

you call anyone. This chapter examines what you do after you plan. Going out and hiring the first security professional you find can result in disaster. As in any other trade, some security professionals are more proficient than others, and some companies offer better service than others. Unfortunately, the

burden is entirely on you. Not only do you what you want, but you also have to ensure expect after the installation is complete. For break a two- or three-year contract. If you

need to make sure the security professional knows that you get what you paid for and know what to example, many people don’t realize that it’s hard to decide to move halfway through the contract, you

might find that you’re responsible for paying for the rest of the contract even if you don’t use the Services.

51

Chapter 2

DETERMINING WHETHER A CUSTOM SOLUTION MAKES SENSE You know that you want a security solution and you've created a plan for it. The problem is deter-

mining whether a custom solution is the best option. Many security vendors have published standard solutions that use basic parts and provide typical security features. The solutions often come at a significant discount because the vendor can purchase parts in bulk and the installer doesn’t need to spend any time learning about a new product. Consequently, a vendor solution can provide a significant savings when the system falls within the goals for your security plan. A standard solution usually includes options that most people want. The vendor has to make sure that the solution meets enough people’s needs to make it popular enough to make a profit. However, you aren't concerned about the vendor's profit—you’re concerned about a good secu-

rity solution. The following sections describe three approaches you can use to keep security costs under control and yet get the protection you need. Good Custom Solutions

Most security vendors don’t assume that a one-size-fits-all solution will work; they have different packages for differing needs. For example, GE (www.protectamerica2.com/products.htm) pro-

vides four standard product packages and then offers to provide additional equipment at an extra cost. The “GE” section of the chapter describes the GE offerings in detail. As with most national vendors, GE lets you customize your system to some extent. For example, you

can add additional motion detectors or breaking glass sensors to your system. The GE setup doesn’t include surveillance cameras, even as an add-on, so this system is a little limited. You'll find many

useful tips about vendors in the “Considering Security Vendor Services” section of the chapter. The reason that this is a good security solution and not in the better category is that you must use GE equipment and solutions. (The same holds true for most large-scale security vendors that

cater to the home market.) Consequently, if you don’t like the GE breaking glass detector because it doesn’t provide shock-alarm capability, you’re out of luck. You need to accept all or nothing with most national home security vendors. Better Custom Solutions

Sometimes you don’t want the limitations of a home security vendor that services a large area. In this situation, you can sometimes rely on a general security vendor—one that services businesses 52

Choosing a Preconfigured Solution

Most large security vendors won't tell you what kinds of sensors they use to perform a given task. In reality, the vendor will likely choose the least expensive option available at the time it purchases the sensors. Consequently, you should always assume that using this

option yields the least reliable and lowest-quality setup. In addition, you could end up with a number of sensor types—one glass break detector might rely on shock as an indicator, while another

relies on sound [audio) as a detector.

as well as homes—to perform the work for you. Working with a large company can still provide cost benefits (although not as great as those provided by home security vendors) and you'll gen-

erally have access to a larger selection of equipment than from a vendor that specializes in home security. For example, Alarms Unlimited (www.alarmsunlimited.com) provides extended security

system support, including closed-circuit television (CCTV). Unfortunately, a general security vendor won't provide the same level of hand-holding that a home security vendor will. When you have trouble operating the equipment, the vendor is likely to direct your attention to an online help source first and, if necessary, provide telephone support. It’s unlikely

that a general vendor will come to your home to show you how to operate the equipment. It’s important to understand that you don’t have to tie monitoring services to the specific hardware you use. You can use one vendor to install the hardware and another to provide monitoring

services as long as the two vendors don’t stipulate these specifics as part of your contract. In some cases, you can obtain a better solution by letting the vendor that’s best at installing systems per-

form that part of the task and choosing someone else to monitor the system. A local vendor and telephone company often work well together in this scenario, but other solutions exist, as described in the “Monitoring Home System Alarms” section of this chapter. Best Custom Solutions

In many respects, the best custom solution is also the most expensive and sometimes the riskiest.

Getting a local security system contractor to perform the work for you is often the best solution because you specify precisely what equipment you want, where you want it, and how you want it

installed. These smaller companies usually provide a great level of service during the installation, but you often can’t count on them after the installation is complete. An exception to this rule is when you use a business such as a local telephone company to perform the work (see the interview with Jamie 53

Chapter 2

Goldsmith later in this chapter for details). These small companies also tend to go out of business and leave you without monitoring or other necessary support.

Fortunately, you can limit your risk and maximize the benefits of a completely custom solution by checking the security vendor first (see “Choosing a Security Vendor” later in this chapter) and

asking the right questions (see “Asking the Right Questions” in this chapter). Exercising a little care at the outset can maximize your chances of success and reduce the risks involved in creating a completely custom solution.

CONSIDERING SECURITY VENDOR SERVICES Choosing a security vendor can be time-consuming. However, it’s better to spend the required

time now rather than find later that you got a bad deal on your security system. Not only do you have to consider the terms of your contract with the security vendor, but you also need to consider the kind of equipment the vendor provides, the level of service you can expect, and other

factors that directly affect the security solution itself.

Of course, the most important consideration at the outset is why going with a national company might be worthwhile. According to Officer Tom Peters (see interview in chapter 3), these companies have economies of scale working with them. These companies are going to make money,

but they do it over time (usually a three-year contract). Consequently, you can often get a better

deal from these companies as long as you're willing to use their solution. The following sections describe what to look for in a security vendor, suggest what kinds of questions to ask, and com-

pare three of the more popular security vendors. Choosing a Security Vendor

It isn’t always easy to know how to choose a security vendor. Because the installer will have close contact with you and everything you own, it’s important to find someone you trust. Unfortunately,

the bad guys no longer wear black hats or carry signs decrying their nefarious activities, so you have to come up with some other means for determining whom to trust. The following steps will

help you make a reasonable selection. 1. Contact your state or local burglar and fire alarm association to find members in your area. If you don’t have a state or local association, contact a national association such as the National Burglar and Fire Alarm Association (www.alarm.org). 54

Choosing a Preconfigured Solution

Always get a complete parts list from the local vendor before you sign anything. In addition, make sure the local vendor provides you with a written estimate and allows you to make substitutions in the parts list at an extra cost. For example, you might decide that you want to use microwave motion detectors, rather than the infrared variety, to reduce false alarms.

You might also decide to use a bistatic sensor for added reliability in place of the monostatic standard sensors. Even though you're having someone else perform the work, you should be aware of precisely what the installer is using. Chapter 4 discusses the various sensor types in more detail.

2. Contact local or state agencies to determine whether a security vendor requires licensing.

3. Call companies provided by the burglar and fire alarm association that haven’t had any problems with local, state, or national agencies. Verify that the company has employees trained and certified by a reputable burglar and fire alarm association, including the

National Burglar and Fire Alarm Association.

4, Ensure that the security company has all required licenses and that the licenses are current.

5. Verify that the security company performs preemployment screening to ensure it isn’t hiring known felons or others with less-than-appealing pasts. 6. Contact your local police department’s crime prevention unit to determine whether it knows of any companies with problems. 7. Contact the state licensing agencies, consumer protection agencies, and the Better

Business Bureau to learn more about a company that interests you. Make sure you check out the list of consumer resources on the American Society for Quality (ASQ) site at www.asq.org/consumer for places you can check for business information. This list features nationally known resources such as Angie’s List and Consumer Reports, in

addition to the Better Business Bureau. 8. Ask for referrals from your insurance agent, relatives, or neighbors. Make sure you ask how long they've known about a particular company.

9. Call each company on your list for an appointment once you've narrowed your list to three or four security providers. Don’t stop with the first company—interview them all. Have all members of your family present when the company representative arrives. 55

Chapter 2

10. Ask for identification when the company representative arrives. Not only does this step ensure that you're talking with a legitimate security provider, but you can also refer to that person in future communications with the company.

11. Ask each security vendor to provide an inspection, recommendation, and quote in writ-

ing. The vendor isn’t obligated to provide any service or honor any guarantees that you don’t get in writing; verbal agreements are only so much hot air. 12. Talk with neighbors, friends, and acquaintances you trust about their experiences.

Sometimes, the best way to have a good feeling about the security vendor choice you make is to talk with someone who is using that vendor. In addition, these other system

users can tell you what happens when an intruder triggers an alarm, how often the vendor raises prices, and other information

that might be hard to find using other

resources.

Asking the Right Questions

Of course, you also need to know what to ask the security system vendor once a representative arrives. The questions you ask should include specifics about your particular setup. You should

also ask about specific scenarios you have in mind, such as what the company can offer to help prevent a home

intrusion.

Here

are some

general questions to consider asking the company.

How many customers do you have in this area? Will you provide customer references I can use to learn more about your company and the service it provides? Can you provide proof of financial stability? Will you provide me with a list of the equipment that you plan to install in my home? What will you do if I find the same equipment for less money from someone else?

Do you use proprietary or standardized equipment? (Standardized is better because it protects your investment if the company goes out of business.)

What kind of equipment warranty do you provide? Do you provide a separate zone for each monitoring device so you know which area of the house is the intrusion target? Will you provide me with complete training on my new system? Can you provide a trial run before I buy the equipment so I can see for myself how easy it is to use? 56

Choosing a Preconfigured Solution

This chapter discusses only a few of the largest and most popular security vendors. You can find a great list of security vendors on the Open Directory Web site at

http://dmoz.org/Business/Business_Services/Security/Alarm_Systems. This list provides not only the business name and a link to its Web site but also a very quick description of the services that each business offers.

¢ Do you delay the signal going from my home to the monitoring facility? (Some companies delay the signal up to a minute to reduce false alarms.) What response time should I expect to receive? ¢ Who pays for false alarms? (Many localities will fine you for a false alarm.) ¢ What protection do you provide if someone cuts the telephone line? (Most companies don’t provide any protection; some provide wireless or other forms of cut-telephone-line

protection.)

¢ Do you provide testing and cleaning for my alarm system?

¢ What upgrades do you plan? (Ask this question so that you know how the system will change to better meet your needs.)

ADT ADT (www.adt.com/adt/) serves a relatively broad range of home and business needs. In fact, the

company has specific services for small businesses and could prove a good choice for someone with a home office. However, it pays to read the contract details for this company with special care and not depend on anything the local installer or the salesperson has to say. See the ConsumerAf fairs.Com write-up at www.consumeraffairs.com/homeowners/adt.htm for details of problems with this company. Table 2-1 compares the basic packages that ADT provides; the table includes only

four out of the eight packages that you'll find on its Web site but represents the most comprehensive packages. (All prices in this chapter are current as of the time of writing and will change by the time you read the book; they're included for comparison purposes only.) You'll want to note some interesting facts about the various packages. For example, the motion

detector, interior siren, and manual police/fire emergency buttons are all part of the Safewatch EZ Touchpad. (The other touchpads provide separate sensors and siren.) This fact means that 57

Chapter 2

LS

Jamie Goldsmith is a security system installer for La Valle Telephone Cooperative in Wisconsin. After performing some addi-

tional research, | found that this combination of telephone and home security services is common in rural areas but relatively

uncommon in urban areas. Even so, Jamie provides some valuable insights for anyone installing a security system. Photograph used by permission of Jamie Goldsmith.

What do you feel are the greatest benefits of having a home security system installed? Probably the most significant benefit to the homeowner is the fact that they now have instan-

taneous knowledge as to the condition of their home. Has there been an intrusion? Has the furnace quit working? It’s no longer a guessing game. The homeowner knows for sure. You had mentioned that it was a little unusual for telephone companies to provide security services and that you offer security mainly as a service to the telephone company customers. How does this affect the way you conduct business? What kind of customers do you provide services for [generally—I know you can’t provide too many specifics}? Very few telephone companies operate their own alarm system business. We do it as a service to our customers. It’s part of our overall strategy as a full-service telecommunica-

tions company. We offer alarm systems to residential and commercial subscribers. The

residential customers are primarily those with second homes who spend most of their

time at their primary residence and want to keep an eye on their alternate dwelling. The commercial customers are primarily convenience stores. One thing we do differently for our customers who wish to install an alarm system is to

bring the phone lines directly into the building without having them show up on the outside

of the building. This makes it harder for a knowledgeable intruder to disconnect the phone lines serving the building. The other thing we do is to install all of the phone jacks in the home behind the alarm system. That way the dial tone goes to the alarm panel first so it can seize the line in the event of an intrusion. When the panel needs to call the central station monitoring facility (CSMF], it disconnects the phones so that the intruder cannot circumvent the panel's ability to contact the alarm center simply by taking a phone off-hook.

58

Choosing a Preconfigured Solution

Are there particular benefits for installing a home security system for someone with a home office?

Those who operate businesses out of their homes usually have at least one room full of some very expensive computers and office equipment. The office equipment is an attractive

target for thieves because it is small and portable. Do home security systems work well in remote or secluded areas?

Security systems that are connected to phone lines that can dial up a CSMF provide a vital link to the outside world for those who live off the beaten path. Some homeowners live far enough away from their neighbors that an alarm siren going off in the middle of the night could be masked by HVAC systems or topographical obstructions. The data link to the __CSMF offers near-failsafe reliability even for those in secluded areas. How do home security systems tend to differ from industrial solutions?

Home security systems differ from industrial solutions mainly in the extent of redundancy in

the system’s ability to contact the CSMF. Industrial systems have two different phone lines serving the alarm panel. Some systems at banks actually have a wireless capability so that they can still contact the CSMF in the event the perpetaiorswas successful iin cutting the phone lines serving the building. Do you recommend a whole-house security solution, or do you prefer to see security solu-

tions that emphasize particular areas? In a typical home there are many places from which an intruder can gain access by prying

open a door or breaking a window. If all vulnerable areas of the home are monitored by devices such as motion detectors, the intruder will have less time inside the building

before the panel contacts the CSMF. In existing homes being retrofitted for an alarm system, it is often difficult or impossible to get wiring to all of the areas deemed vulnerable.

At the very least, it isnecessary to mount motion detectors in the areas where a burglar would have to pass by in order to remove valuables from the home. Which home security solutions do you find work best? My personal favorite security device is the so-called dual-technology motion detector. It uses both passive infrared and microwaves requiring both instantaneous heat and motion in order to signal an alarm state. This greatly reduces or eliminates false alarms. Are there any home security solutions that don’t work at all? | am not a fan of wireless systems because of the obvious need to replace numerous batteries as opposed to one large central battery that is constantly charged by the alarm

5?

Chapter 2

SE

ea

panel and monitored by the CSMF. There may be instances where wireless is the only way to get a sensor where you need it. |would only use wireless as a last resort.

Q.

Have you ever had to fix someone's do-it-yourself solution? If so, what seems to be the

A.

Very seldom am | asked to install a security system using wiring that was originally

most common problem you find (or the least common}? installed by the homeowner. It is often more troublesome to try to reuse the existing wiring

than it is to completely redo it. This is due to reliability issues. The exception to reusing the existing wiring is if it were professionally installed, in which case | would not hesitate to use it. Q.

Do you feel that home security solutions should also include personal assistance? For example, someone falls and uses a call button to receive help?

A.

Personal assistance is a reassuring feature on an alarm system, especially if the homeowner is elderly or disabled. There are a number of ways to implement personal assistance on an alarm system, the easiest being a wireless pendant or bracelet ‘panic button” that is connected to a twenty-four-hour zone. If someone falls or is indisposed and pushes the panic button, the alarm panel will call the CSMF even if the panel is not armed.

Q.

How would you rate the following home security goals and their importance from a security system installer perspective?

Protection (| want to keep the burglar at bay using a combination of electronic and physical security). Security systems can protect property, thereby keeping down insurance rates. Determent (I want to scare an intruder away].

The obvious presence of a security system can keep intruders from entering a building.

>o> Monitoring

{I want to know who is snooping around my home, even if they don’t enter it

illegally). A.

Access control creates a record of who has entered or left a building based on the arm/disarm code that was entered.

Q.

Outside assistance [I want to have some means of contacting someone in an emergency,

A.

Timely attention to a medical emergency can greatly reduce the cost to the health-care

no matter what that emergency might be). system.

ae Self-defense (I want to keep myself safe]. A.

60

Due to the legal ramifications of protecting oneself with dangerous weapons, such as the

Choosing a Preconfigured Solution

specter of wounding ; an1 intruder who may turn around and sue the homeowner, it is proba_ blybetter to take allreasonable precautions to avoid allowing an attacker into the home in the first place,and a security system goes a long way in that direction.

your motion detector could be nearly useless depending on where you install it. In addition, you can’t place the internal siren so you can hear it throughout the house, making this feature poten-

tially useless as well. The manual police/fire emergency buttons are a phenomenal idea because pressing them sends a message to the necessary party without alerting an intruder, but, again, you can't choose where to place this button, making it potentially useless when you need it. ADT provides one of the largest lists of add-on features of any security vendor on the market

today. Look at the list provided by the Customize link (you must look at a particular package before you can see the available options for it) and you'll see a list of the options for a particular package. You can include everything from a barrier bar ($90) to an overhead door sensor ($125) that helps protect your garage door. Unlike some other large security companies, ADT offers separate audio glass break detectors ($150) and shock detectors ($115), so you can choose the level of glass break detection that you prefer. As the package price increases, so does the num-

ber of add-ons you can get. By the time you get to the Family Package, you can get flood detectors ($99) and both medical ($150) and panic ($150) pendants.

The Premier Package is one of the best options for the homeowner with a home office. It not only includes a number of additional sensors, but the package options also include various cameras. You can even set up an intercom system with video so you can see whom you're talking with

and ensure that they’re actually safe. Of course, the Premier Package comes

at a premium

price—as do all of the options. In addition to the usual smoke and carbon monoxide sensors, you can get a rise of heat detector.

ADT has so many packages and options that it’s hard to describe them all here. The top-end systems require a personal consultation. You can find out about this option

by looking at the PowerHome page at www.adt.com/adt/powerhome/.

61

Table 2-1. Comparison of ADT Packages for Homeowners SS vy te ee a EZ Essentials Feature

Safewatch EZ Touchpad Safewatch Pro 3000 Touchpad

eee

Package

Essentials Plus Package

Family Package

Premier Package

1

N/A

N/A

N/A

1

1

N/A

N/A

N/A

N/A

1

N/A

N/A

1

1

ail N/A i

Safewatch Pro Custom

Talking Touchpad Safewatch Touchcenter

Home Console Wireless door and window contacts

Z.

2

5

3

Interior siren

|

1

1

1

Motion detector

1

1

|

1

EZ Alarm-Activating Deadbolt Strike Cup

1

1

Not listed; possible extra charge

Not listed possible extra charge

iFob Reset Key

|

1

Not listed; possible extra charge

Replaced by Quick Key Remote

1

1

1

1

Chime feature

N/A

1

1

1

Heat detector

Extra charge

Extra charge

1

1

Smoke detector

Extra charge

Extra charge

1

1

Carbon monoxide detector

Extra charge

Extra charge

Extra charge

1

$249.00

$349.00

$599.00

$899.00

$33.99 a

$36.99

$37.99

Manual police/fire emergency buttons

Price

Monthly monitoring $32.99 a 62

Choosing a Preconfigured Solution

Depending

on your home-business needs, you might want to review the smallbusiness options for ADT at www.adt.com/smbiz. The small-business protection provides better intrusion protection and video surveillance than the home packages do. Unlike the home packages, however, the business package requires that you have an ADT representative visit

your premises for a consultation.

These sensors are a good addition to a home with high ceilings or an odd setup, because some-

times a smoke detector won't detect smoke until your house is a raging inferno. Combining smoke and heat detection greatly enhances the probability that the fire department will arrive before your home suffers much damage. Make sure you view the ADT Web pages carefully. For example, when you view the main EZ Essentials Package page at www.adt.com//resi/system_packages/package/?package=2, it appears that the one-time telephone connection fee is included as part of the package. However, when

you view

the customization

page

at www.adt.com/resi/system_packages/cart/customize/

Poptions=all, you'll find that the package doesn’t include the $25 connection charge after all. Most of the product features have great descriptions. You can click a link and determine quite quickly how a particular feature will help you. However, the chime feature mentioned for many of the packages doesn’t include a description, and contacting the company didn’t garner me any

information. Given that the Web page also fails to provide a picture of this feature, you must guess at what functionality it provides. An e-mail to the company didn’t provide any useful information on this particular feature. Brinks

Brinks (www.brinkshomesecurity.com/) provides services in a number of areas, only one of which

is home security. Brinks is one of the few major security vendors that will provide monitoring services when you already have a security system installed or install a security system and monitor it when needed. In fact, you can create mix-and-match setups that rely on a combination of Brinks and other vendor equipment. You need to talk with a Brinks representative to learn more about activation and monitoring fees. Unlike

many of the other security vendors,

Brinks seems

to avoid criticism.

For example, 63

Chapter 2

ConsumerAffairs.Com doesn’t have any reports on this company. After looking for a while, I did

find a complaint on Complaints.com (www.complaints.com/september2002/complaintoftheday .september7.23.htm) that emphasizes the need to read the contract you sign and notes a lack of

diligence on the part of the vendor. Brinks offers fewer packages than many other vendors and

less in the way of options. Table 2-2 shows the packages that Brinks offers. These are simple systems, but they include a number of interesting features. For example, both packages include a master control panel you can use to expand the system as much as needed. Brinks seems determined not to lock you into a particular solution—they make their money monitoring your system. In addition to the master control panel, you also receive buttons for notifying police, fire, or medical services as needed. Most companies that provide panic buttons

as part of the keypad seem content to provide police and fire assistance alone. Brinks is one of the few companies that also use wired, rather than wireless, sensors. Using wired sensors means that you don’t have to worry about replacing batteries, and the sensors are much

more secure than the wireless variety. However, you'll also notice that Brinks charges a separate installation fee, which is one of the downsides of using wired sensors. Unfortunately, Brinks hides the installation fee and you need to look carefully for it on the Web site. However, Brinks doesn’t

Table 2-2. Comparison of Brinks Packages for Homeowners

Standard

Premium

System

System

Standard keypad

1

N/A

Premium keypad

N/A

1

Door and window contacts

2

3

Siren

1

1

Manual police/fire/medical emergency buttons

1

1

Motion detector

1

1

Master control panel

1

1

Price

$99.00

$205.00

Installation fee

$99.00

$99.00

Monthly monitoring

$27.99

$27.99

Feature

eee

64

Choosing a Preconfigured Solution

The Brinks keypad simulator is a great start, but it’s not the end of the line. Make sure the vendor you choose provides proper training for the equipment you purchase. In addition, make sure the vendor provides instruction for all family members, not just those making the purchasing decision. It’s especially important that all family members try the equipment to ensure they can use it. Children and elderly family members can have special access needs that you should test as part of getting the equipment installed.

hide the fine print about your agreement with them. You can read it at www.brinkshomese curity.com/home.aspx?page=ordernowdetails.

The standard keypad that Brinks offers is a very simple setup that doesn’t provide much handholding. Fortunately, you can try an online demonstration of their keypad at www.brinkshome

security.com/hs.aspxPpage=keypaddemo. The premium keypad is better: it has a backlit display and provides hints and tips as you work with the keypad. The extra help is handy for less-experienced users who might become confused otherwise. According to Officer Peters there are a lot of latchkey kids who come home to an empty house. As long as they properly use the system, meaning their friends don’t stand behind them as they enter

the code, it’s a great way for them to know the house is secure when they come home. They can go inside and secure the house behind them; they can secure the house if they have concerns.

Many keypads also include a feature where the system reports to the parent when the child doesn’t deactivate the system within a given time frame. According to Officer Peters, “These systems are using an open/close report, like a business. Banks do it all the time; they open within a set twenty-

minute window and close within set twenty-minute window. If that signal doesn’t come in, there is a problem. This is a beneficial system, but you have to balance your needs with what you're paying for. Do you really need it? If you do, it’s very beneficial. You have to consider your neighborhood, your kids, where you live (Chicago, New York, or a rural area), and your neighbors (do they watch out for you or don’t you even talk with them?). It’s all a matter of balance.”

GE As mentioned earlier in this chapter, GE (www.protectamerica2.com/products.htm) provides

four standard product packages and offers to provide additional equipment at an extra cost. After 65

Chapter 2

ee

Make sure you understand why GE is willing to give you a basic home security system free. Remember that GE, like every other company, wants to make money, so

giving something away free normally means that you'll pay for the product in some other way. Many security vendors lock you into a contract for a specific time frame to recoup their investment. Always read the contract carefully before you sign it; only what's written in the contract matters, not what the salesperson tells you.

checking various agencies online, I wasn’t able to find any complaints about GE service or contract support. However, you can find lots of complaints about GE equipment failures such as the

carbon monoxide detector recall write-up on ConsumerAffairs.Com (www.consumeraffairs.com/ recalls04/co2.html). GE offers the four standard packages shown in table 2-3.

The items in the table that you really need to consider are the motion detector and the wireless door and window contacts. The interior siren is helpful to you because it alerts you to an unwanted presence, but every package includes this feature, along with the talking command sta-

tion. It’s interesting to note that you must purchase motion detectors separately for all but the

GE Home Security System Bronze Package. At first, you might wonder why. The limitation makes sense because the other packages are for larger houses with complex setups. However, the table is a tad deceiving unless you spend time considering the implications. When buying any of the other packages, you need to customize the setup at $150 per motion detector ($99 on sale).

If you have three rooms that require motion detectors, the GE Home Security System Upgraded

Platinum Package suddenly becomes a lot more expensive, even at the promotional price. You also need to consider what the vendor means by “lifetime equipment warranty.” When you read the fine print, you'll find that GE will pay up to $250 of your home deductible. This means that you need home insurance that has a deductible of $250 or less to have everything covered; otherwise, you're responsible for paying for anything else. In addition, the company will replace faulty equipment, assuming you still have the faulty equipment to replace. GE won't cover any

stolen equipment.

A hidden cost for all of the setups is the two-way talking keypad. This device resides on the outside of your home. The keypad portion lets you enter a number outside your home to gain entry without tripping the alarms. Of course, you can also enter this information inside the house after 66

Choosing a Preconfigured Solution Table 2-3. Comparison of GE Home Security System Packages for Homeowners

Feature a

re

ee

Bronze Package ei

Upgraded Silver Package es en tes

Upgraded Gold Package es eee

Upgraded Platinum Package

Talking command station

1

1

1

1

Wireless door and window contacts

3

10

15

20

1

1

Interior siren

ah

S

Wireless eee

Window stickers Lifetime equipment warranty

A

ae

Yard sign 4

Sar

aaah

B

co in =e: cones

ate

ia

see

eae

;

ica

eS .

A ETL bs Eten ieee i

eta a

at

eee io

Sth 80
: How Gd ERs

Pal

| G’

L

F

omy

>

be sy bos

; Vote

Ue.

=

a

es

we aoncas aden ere

;

7 see

YY

9

Ory

aa ae)

x \ ote és PLA

“SMe

a

May nek ake 4

my @

eA &

7 rh

ia

i

mat

.

=


hide in doorways.

Bushes and trees can cause algnificant blind spots,

Fig. 4-1. Look for potential hiding places as you inspect the outside of your home. Figure created by author.

place for an intruder to hide. The intruder could also hide on the side of a chimney or in other

areas where a natural or manmade object provides protection. You want to eliminate all of these hiding places to reduce the risk of an intrusion. Good, Better, and Best Sensor Combinations

The standard sensor combination is a combination of an alarm panel, first-floor door and window

sensors, and one motion detector used in a trap area. It doesn’t sound like very much hardware and it isn’t. A smart intruder could easily avoid detection with this setup. However, this sensor

combination can provide a good setup for the average homeowner with a moderate income and few high-value items to protect. If you decide to take this simple route, you should also include a fire and carbon monoxide sensor because intrusion detection doesn’t provide much help if you’re

already dead from some other cause. When you live in a remote area, you should also consider 96

hee ee

Considering Custom Solutions

Look for crawl spaces and other areas that an intruder can use to escape detection and gain access to the house. Make sure you address them by sealing the holes or adding physical security to them. You might not think this is very important, but it really is. For example, an older home in San Diego had a crawl space under the house (no basement). An

intruder could crawl under the house and gain access to the interior of the home through an old pie closet. The pie closet kept pies cool using a screened hole through the floor to the area under the house. All an intruder needed to do is knock out the pie closet screen to gain access to the home. The police might not even figure out how someone accessed the house in this case because there wouldn't be any obvious point of entry.

adding a flood sensor to this simple setup because rural homes can flood from a number of causes that urban homes don’t face. Adding a temperature sensor as well would ensure the home remains

warm enough to prevent the pipes from freezing (a common cause of problems in cold climates).

A better sensor combination includes glass break sensors in addition to the door and window sensors. The sensor setup relies on the divide-and-conquer approach that many security professionals prefer. You place a motion detector trap between the first and second floors. Larger homes require that you divide each floor in half and place a motion detector in a location that the intruder will enter but that won't cause problems for the homeowner. Some homes might require

additional sensors to provide full coverage. Of course, you'll want to include external automatic lights and other elements to deter the intruder from entering the house at all.

The best sensor combination includes everything in the better combination plus external sensors and cameras. This combination ensures that you can see threats before they even reach your home. Depending on your setup, you might want to add a driveway sensor. However, you also need to consider your abilities at this stage because the sensor setup can become quite complex (see “Considering Your Capabilities” in chapter 3). When creating the solution yourself, you need

to think about what tasks you can realistically perform. After all, the security sensors can’t protect your home when they aren't functional or installed correctly. Good, Better, and Best Physical Security

The do-it-yourselfer or hobbyist gains the greatest benefit from the home inspection when it comes to physical security. In addition, physical security is often the easiest to implement. You eal)

Chapter 4

As you add these items to the list, think about installation locations, wiring requirements, and other issues. It’s one thing to say you need a motion detector; it’s

another to ensure the sensor will work. Consider using wireless sensors where wired sensors won't work. Make sure you obtain high-quality sensors. Think about the needs of pets when you choose a sensor; some motion detectors provide special features that allow for animals of a certain size. Include children in your planning, by making sure sensors are high enough to keep little hands from setting them off or damaging them.

can easily install and verify the operation of a lock. The tools and technology are both simple. However, the impact of the best locks is to keep all but the most determined intruder at bay. Physical security is all about keeping someone out of the house in the first place.

A good setup always includes strong doors, a standard door lock and dead bolt, and window locks.

“Defining the System Parameters” in chapter 3 describes many of these elements in detail. Make

sure you include your safe room in your physical security setup. The safe room should include a heavy door and locks to keep the intruder out. In fact, make sure you have at least two dead bolts (one about a third from the top and another a third from the bottom) on the safe room door in addi-

tion to the standard door lock. Using dispersed locks means the intruder will have to knock out the

entire jamb to get to you, and most people just aren’t interested in expending that much energy. A better setup can include several additional measures such as using security film on the windows. This is an easy addition for the do-it-yourselfer to make; it costs very little yet has a signif-

icant impact on physical security. However, the better setup is actually the energy-efficient setup in many cases. Adding insulation around the door makes it tighter. A tighter door lets less cold air in, so it’s more energy efficient. The tighter door also lets the door move less, which means

that an intruder has a harder time trying to jimmy it. (This same tip holds true for windows.) At least a few thieves have gained entrance to a home through the chimney. Closing the flue on your chimney using the damper saves energy and also makes this point of entry impossible to use. In short, every time you make your house tighter, you save heating/cooling dollars and keep intrud-

ers at bay as well. Security can save you money in many ways.

The best physical setup moves beyond making things secure and tight. Adding window bars or sensor screens is a big help, especially in the summer when you keep windows open for cooling. 98

JE

ata

Considering Custom Solutions

Don't seal any home entrance permanently. For example, you might be very tempted to place strong bars across the entrances to the space under your home. Yes, a locking gate-type mechanism is a good idea, but sealing the entrance permanently isn’t. Many plumbing, gas, and electrical repairs require access to the underside of the house, so keeping this area accessible is important. Of course, since you won't need access very often, using a metal gate or other locked, sturdy covering is important. Likewise, don’t seal attics. Not only will repair people need access to the attic, but the airflow also keeps the wood for your roof from rotting. Houses need to breathe, to a certain extent, to remain healthy.

Using double entry doors can also help. The first is at the outside of the home, the second is in the mudroom or entryway prior to entering the home. Most people don’t lock the second door,

but locking this door can thwart intruders long enough for the police to arrive. The intruder is in

your mudroom or entryway, but most people don’t keep many valuables there. Good, Better, and Best Special-Needs Options

Everyone has special needs, but some people have more than others. In fact, special needs

change over time. A home with little children requires different kinds of physical and electronic security than a home with elderly people. The pool sensors you install for a family with children might not prove as necessary for households without children. Likewise, the elderly often have visual, aural, and medical needs that younger families don’t have. In some cases, you might have

to provide a combination of support when a family with children has grandparents living with them. Consequently, when you create a security solution to meet your special needs, be aware

that those needs will change. Assess the need for updates yearly so that the security system keeps pace with your particular needs. A good special-needs setup will include at least one panic button each for fire, police, and med-

ical emergencies. The panic button normally appears as part of the alarm panel, which means the it. When you can’t count on the family member family member must reach the panel to press reaching the panel, a good setup also includes a pendant or wall-mounted panic button in other

areas of the home. Make sure you include panic buttons as needed to ensure that the person can

actually set them off. It’s also important to consider physical, visual, and aural needs for a good setup. Install ramps as needed. All showers should include handholds—anyone can fall, not just 99

Always use screws to install handholds. The screw should completely occupy the

mounting hole, and you should provide a screw for every mounting hole in the device. Make screws long enough to provide a good grip into the wall—at least 1 1/2 inches in most cases. Use anchors to increase the grip of the screw in walls. Attach the screws directly to wall studs when possible. Check for loose screws routinely and tighten any that you find loose. Remount the fixture

when you can no longer tighten the screw properly—a loose screw won't support someone's weight.

the elderly. Install rails for all stairways, on both sides of the stairs if possible, to accommodate

people who have use of only one arm. Make sure you provide plenty of light, especially on stairs. Consider adding more nightlights or installing stair lights as needed. The extra you spend in electrical is insignificant compared to the cost of a broken limb from a fall. All of these extras are relatively easy to install using a drill, hammer, and screwdriver.

A better setup for special needs will include considerations for those outside the immediate family. For example, installing a ramp for someone that uses a wheelchair is helpful. You don’t necessarily have to make the entire house wheelchair accessible for those who are just visitors, but they'll appreciate the extra time you took to meet their needs. Of course, it costs something to

make these changes, but you also gain something. By making your house friendly to everyone who visits, you reduce the risk of an accident and make everyone feel more secure.

The best setup for special needs will include sensors and some types of monitoring. For example, the “Best Hybrid System Solutions” section of chapter 3 discusses a child-abduction alarm

you can use to monitor your children. These sensors meet a special need for people who can’t

take care of themselves. Although chapter 3 doesn’t mention it, you can also use this sensor to keep an older family member with a condition such as Alzheimer’s disease from wandering off. The important consideration is making the protection effective yet unobtrusive. You don’t want

to reduce adult family members’ independence or spy on them, but you do want to protect them and meet their specific needs. Sometimes it’s a very fine line to walk.

CONSIDERING SECURITY SENSORS

Security sensors come in all shapes and sizes. They perform a myriad of tasks—everything from monitoring your house for fire to detecting the presence of an intruder. In fact, vendors create 100

Considering Custom Solutions

so many different kinds of sensors that you could easily spend weeks searching for the sensor you need. The following sections categorize sensors by type and function. For example, when you need to monitor your house for potential fires, you'll choose one of two environmental sensors: the smoke detector or the heat-rise sensor. These sections won't limit your choices; they merely provide the knowledge you need to make a good purchase. Environmental

Environmental sensors help you monitor your home and the surrounding area tions. Fire and noxious gases can not only cause physical damage to your home damage to you in ways that might not be apparent at first. The following sections of environment sensors so you can choose which forms of protection to include

for harmful condibut can also cause describe the kinds in your home.

Smoke Detectors

Not all smoke detectors are the same. In fact, smoke detectors use a number of technologies to perform their task. Consequently, going to your local store and grabbing the least-expensive

smoke detector from the shelf might be a big mistake because you might not get the right kind for your home. Even though smoke detectors use a wealth of strategies to sniff smoke in your home, you can categorize the basic technologies into two groups, as shown in figure 4-2.

Photoelectric Sensor

Normally, light passes directly through the sensor.

Smoke causes the light to bend and activate the sensor.

lon Sensor

Fig. 4-2. Be sure to get the right kind of smoke detector for your home. Americium 241

101

Chapter 4

Eric Gagnon, M.A.Sc., P.Eng., is an electrical engineer with more then thirteen years of embedded design experience. He has

designed several mobile security video products, including a digital video recorder for the mass transit industry and a taxi-camera product used in taxicabs all over the world. | first encountered Eric's work in the November 2004 Circuit Cellar article entitled

“Simple Four-Channel Network Video.” Photograph used by permission of Eric Gagnon.

Q.

What do you feel are the greatest benefits of getting a home security system installed?

A.

\n my opinion, the greatest benefit of having a home. security system installed is the deterrent effect. It's therefore important to not only install the security system but also to have visible signs of the system in plain sight. This can include window stickers, audible door open” chimes, as well as at least one visible security camera in the open.

Q.

Are there particular benefits for installing a home security system for someone with a home office?

A.

People working at home tend to spend a lot of time at their house and are able to show signs of the house being occupied, which likely makes it a less attractive target to would-

be petty thieves. On the other hand, the value of the office equipment owned by homebased businesses is much higher than in a typical house. Therefore, a visible security system can help to provide peace of mind and, in some cases, early warning against unwanted intruders.

Q.

If you were to install a home security solution, would you create specific devices for special areas of the house or concentrate on a whole-house solution?

A.

| think, based on your overall budget, that it would be possible to allocate more resources to specific higher-risk areas and use simpler approaches for the low-risk areas. For

instance, you could set up CCTV [closed-circuit television] cameras at the entrance and backyard and more-conventional sensors elsewhere.

Q.

102

Are there any home security solutions that don’t work at all? I'm not talking fake security cameras here, but devices that you've tried that purport to perform a particular task and then fail to perform that task well.

Home alarm sirens. Just about everyone ignores them. Do you feel that home security solutions should also include personal assistance?a example, someone falls and uses a call button to receive help? Yes, it definitely could prove beneficial, especially for the elderly, as ae as me — mechanism prevents invasions of privacy from outside parties. When building a home security setup, would you build the entire system yourself or would you rely on some off-the-shelf components? — _. Given that the price was reasonable, | would definitely use « olfthe-shelf componente However, that’s not always the case. oe newer oo are sometimes out of reach

_ for the average consumer. Which home security components dc you feel are easiest to build? Being a hobbyist myself, | definitely enjoy working on the heart of the _

but | think

developing custom peripheral sensing solutions is also very interesting.

Which home security components do you feel the pee a

eroaea

a

~—

because of cost or complexity issues? — As far as cost is a concern, | think each person's budget will inherently limit | the range of accessible components. In a technical sense, itdepends on each one’s ability. Some hobbyists are at home with microcontrollers and custom board design, and others are more comfortable working at the system level on interfaces between off-the- shelf original

equipment manufacturer OEM [original equipment manufacturer] components. _ Your Circuit Cellar article shows how to build a four-channel network video server. What was your main motivation in building this ou After using itfor a while, have you found

- unexpected benefits or problems? My motivation for developing a network video server was initially driven by my electronics hobby and my past experience in digital video and networking. | did, however, have a problem with an unknown animal digging up the flower bed in front of my house. Though | didn't catch it in the act, | certainly learned a lot in the process.

After having installed the camera system for about six months, | definitely get the comment that people are aware of the presence of the cameras at the front door. This has a deterrent effect. Strangely enough, oneof the best, unexpected benefits |have observed is that door-

to-door salespeople tend to not be as aggressive and kindly step down when asked. How would you rate the aoe ist perspective?

home ou) goals ane

eee

rrr a hobby-

.

103

Chapter 4

a eee LL

First, protection (I want to keep the burglar at bay using a combination of electronic and

physical security). Important. Second, how would you rank determent (I want to scare an intruder away]? Most important. Prer © What about monitoring (I want to know who is snooping around my home, even if they dont

enter it illegally]? Very important.

Q.

Next is outside assistance (I want to have some means of contacting someone in an emergency, no matter what that emergency might be].

>

Important.

Q.

And, finally, where would you rank self-defense (I want to protect myself]?

A.

Least important.

The photoelectric sensor works best when you use the smoke detector to detect black smoke. For example, you might use this kind of smoke detector in a room with a fireplace. You don’t want the smoke detector going off every time you start a fire, but you also don’t want a fire in this room

to spread to other areas of this house. A photoelectric sensor works by detecting actual smoke particles in the air. The light source bounces off these particles and transmits light to the receiver at a 90-degree angle, as shown in the figure. This particular sensor is less likely to cause false alarms, but it also isn’t as sensitive as an ionizing sensor. You'll also find that the photoelectric

sensor is slightly more expensive than an ionizing sensor. The ionizing sensor relies on a small piece of radioactive material to ionize the oxygen and nitrogen in the air. Air enters the ionizing chamber, which is composed of two oppositely charged plates and a small piece of radioactive material. Normally, the ionization process causes a small electrical current to flow. However, when smoke enters the ionizing chamber, it attaches

itself to the ions and no electricity flows, causing an alarm to sound. However, unlike the direct particle sensing provided by a photoelectric sensor, this method is indirect. Anything that disrupts the flow of ions can cause problems, including water vapor, dust, and other household elements. Consequently, you can receive a significant number of false alarms using this sensor.

However, building this sensor is also very cost effective, so the smoke detectors are relatively inexpensive. 104

Jere wee

Considering Custom Solutions

The amount of americium 241 present in the smoke detector is too small to cause problems when you keep the container closed. In fact, a simple sheet of paper could block the radiation within a smoke detector; the only way you can run into problems is if you open the smoke detector and inhale the radioactive element.

Generally, you'll buy a smoke detector off the shelf, because it can become a somewhat complex device and the price for an off-the-shelf model is actually quite low. However, you don’t have to

buy it off the shelf and it isn’t necessary to create your own design. You can find many compelling designs online. For example, the University of Illinois published a wireless model, complete with analysis and schematics, at http://liu.ece.uic.edu/ ~dliu/Sdesign/g2002S. As shown in section 6 of

the report, you could build this model for around $38.40.

Most people are familiar with the standard enclosed smoke detector. The enclosed unit relies on several different designs, but most follow the basic setups shown in figure 4-2. All of these selfcontained units are spot sensors; they have a limited range and rely on the fact that smoke should

distribute evenly at the ceiling of your home before moving to other areas. However, you might choose a special design for your home based on specific needs. For example, A-frame houses can

prove difficult because of their shape. Cathedral ceilings also provide a challenge for most smoke detectors. You might want to use the single-ended reflected-beam smoke detector described at www.systemsensor.com/html/guides/A05-0095.pdf

instead.

In most

respects,

a single-ended

reflected-beam smoke detector is simply another variant of the photoelectric-sensor smoke

detector shown in figure 4-2. You can purchase a reflected-beam smoke detector from several online

stores,

including

Bass

Home

Electronics

at www. basshome.com/product_10735

_detailed.htm.

Rise of Heat Detectors Sometimes it isn’t practical to detect smoke at all. For example, anyone working in a kitchen

knows that it’s quite easy to produce smoke without encountering any risk of fire. Placing a smoke

detector in a kitchen or an area with a fireplace will almost certainly result in some false alarms. A rise of heat sensor can help in such situations. Instead of detecting smoke, a rise of heat sensor detects changes in temperature. 105

Chapter 4

As an example of what can happen with smoke alarms in the kitchen, one woman presented the following story. “The smoke alarm in my last apartment used to go off just about every time | baked chicken. | finally came up with the idea to turn the heat off a few minutes before it was finished, and then let the heat finish the cooking. By the time | took the chicken

out, the sizzling had stopped and the smoke alarm wouldn't go off. What a pain!”

Most rise of heat sensors include two detectors. The first sensor detects quick changes in temperatures—usually around 15 degrees in a minute. This sensor checks for problems, such as grease fires, where the temperature change is fast. The second sensor detects a specific temperature, normally around 135 degrees. Because 135 degrees is well outside the normal comfort zone of humans, the assumption is that a fire or other heat source has caused the problem. In a few cases, the rise of heat sensor will include a third detector for freezing conditions. This fixed

temperature detector normally sounds at 41 degrees, which offers enough of a buffer to fix the

problem before the pipes freeze in the house. A rise of heat detector also has a wide area of detection when you install it correctly. Given the right floor plan and the correct setup, a single rise of heat sensor can cover an area of 2,500 square feet in most cases. Some vendors will combine a rise of heat sensor with a photoelectric smoke detector for an improved level of protection. You can find a number of suitable units on the Safe-Mart Web site at www.safe-mart.com/smokedetectors.html. A wireless rise of heat sensor appears on the Safe-Mart Web site at www.safe-mart.com/geheser.html. Carbon Monoxide Detectors Carbon monoxide (CO) sensors detect the amount of carbon monoxide in your home. Carbon monoxide can cause a number of problems, including death, if you breathe it long enough. You

can find an overview of carbon monoxide poisoning symptoms at www.carbon-monoxide-poisoning.con/effects.html. The FAQ: Carbon

Monoxide Web site (www.nadi.com/SAFAQco.html)

contains detailed information on the topic. Generally, you need to be more aware of carbon monoxide during the winter months in most areas. Faulty heating devices, faulty chimneys, and

other sources combine with a tightly shut home to create a death trap that you can’t smell, hear, or see. Although carbon monoxide poisoning isn’t common, it does happen often enough that you ll want to protect against it.

106

nears

Considering Custom Solutions

Never place a rise of heat sensor close to a fireplace or woodstove. The stovepipe and immediate opening areas can reach temperatures of 500 degrees with a decent wood fire inside. Considering that paper burns at 451 degrees, you'll want to keep the immediate area free of combustibles as well. However, you can place the rise of heat sensor in the same room as long as

you have sufficient distance between the heating device and the sensor [at least fifteen feet]. Place the rise of heat sensor in an adjacent room when you can’t meet these minimum requirements.

Most carbon monoxide sensors use one of three techniques to detect the gas. A good carbon monoxide sensor will use a colorimetric sensor detector. The advantage of this detector type is low cost. However, it has a forty-eight-hour reset time, which means that you're effectively unprotected when you're likely to need the sensor the most. This sensor also requires the most time to detect a carbon monoxide leak in your home. A better carbon monoxide sensor will use an electrolytic sensor detector. This is actually the most effective and sensitive carbon monoxide detector. However, the high cost of the detector within the sensor makes this sensor more

expensive than other options and reduces availability. Finally, the best carbon monoxide sensor will use a metal oxide semiconductor (MOS) detector. The advantage of this detector is that a

vendor can use it to create a sensor for multiple gases, because the MOS detector can sense a wide range of gases. In addition, this is a moderately priced option, so you can save money by getting it.

Radon Detectors Radon is a colorless, odorless, naturally occurring radioactive gas that can occur in any home. The levels of radon in a home can vary from month to month. In many cases, you won't need to do

anything about the radon because the levels are too low and it dissipates quickly. In fact, radon

might not become a problem in your home until you close it up for the winter months. However, monitoring can be helpful in some areas. You'll want to contact your local county health extension (or bureau) for additional information.

Most radon sensors are relatively expensive. One place to find such as sensor is the Security Pro USA Web site at www.securityprousa.com/radondetector.html. This detector requires that you visually monitor the radon levels in your home and make a decision about their safety. If you want

to make a onetime, short-term test for radon gas in your home, try one of the kits on the Pro-Lab Web site at www.baproducts.com/prolab.htm. This Web site also has an amazing array of single107

Chapter 4

SE ae

aA

Don’t confuse a carbon monoxide detector with a CO fire detector. The second device senses the amount of carbon monoxide in the air as a means of detecting fire. Fortunately, this second detector type is somewhat rare—people tend to confuse the two sensors and get the wrong one. You can learn the facts about CO fire detectors on the Apollo Web site at www.apollo-fire.co.uk/prod-serv/COdetectors.htm. Another good source of information is the British Fire Protection Association Web site at www.bfpsa.org.uk/html/news_COdetectors.htm.

test kits for everything from bacteria and pesticides in your water to asbestos. Unfortunately, you won't find any means to monitor radon gas automatically.

Cameras Cameras provide a means

of monitoring the activity around your home. Many people use cam-

eras around the perimeter of their home. However, you can use cameras to monitor specific locations within your home (such as an entryway) or as a means of observing the property as a whole.

Many people use cameras for both security and pleasure by monitoring the natural events around them. For example, you can use cameras to watch deer. The point is that cameras can perform

monitoring for a number of purposes. Any camera that you want to use for security should produce a color image. A black-and-white image is nearly useless to law enforcement because it loses important data such as the color of

the person’s hair, clothing, and so on. In addition, the camera must produce a high-quality image. Again, a fuzzy picture that lacks detail isn’t much use to law enforcement.

Wired and Wireless Cameras Wired and wireless cameras come in a number of forms. Of course, youll need to choose first

between the wired and wireless connection. Wired devices tend to provide better and more reliable pictures. A wired camera doesn’t require batteries in most cases. Wireless devices provide

better portability; you can simply move some units from place to place by picking up the device. In addition, you don’t need to provide any wiring for wireless devices. From a price perspective, you'll generally pay less for a wired device (because it doesn’t contain a wireless transmitter), but the cost difference isn’t very much. 108

os

cele

Considering Custom Solutions

Some vendors will try to sell you video equipment that takes a picture in one-second or longer intervals. In addition, this equipment normally doesn’t provide good image resolution. This equipment isn’t very useful because the police will end up with a grainy image that doesn't tell them anything about the intruder. Using video equipment that provides nearly constant input produces images that are easier to analyze. The police can use special software to compare adjacent video frames and improve the image quality. Higher-quality equipment also tends to provide a higher-resolution image. Always buy the best equipment you can afford.

One of the decisions you need to make is where you'll install the camera. Some cameras work well outside, others inside, and some work in both locations. Exterior cameras often cost more

than interior cameras because they must use higher-quality components to keep outside elements, such as rain, at bay. The point is to verify that the camera you choose is suited to the target environment.

Cameras take pictures, but they don’t do anything with them. Consequently, you need a monitor

of some type to see the pictures the camera is taking. Some companies produce cameras that connect directly to your home computer.

For example, the Motorola Home

Monitoring and

Control System (http://broadband.motorola.com/consumers/home_monitoring.asp) comes with

connections for your PC. All you really need is the camera if you already have a PC in your home.

Of course, now the PC is doing double duty, so you have to consider your computing needs. The Motorola Home

Monitoring and Control System is versatile and includes features you

should look for in any system you select. For example, you can add up to six cameras using a com-

bination of wired and wireless connections. The cameras need not be on all of the time; a built-

in motion detector makes it possible to set the camera up to take pictures only when something is happening. The motion detector also cues the system to send an alert to your cellular telephone or e-mail, so the entire setup combines monitoring with alerts.

Not everyone has a home computer or, at least, one that they can use partially for security needs.

The X10 network is a popular solution for networking home electronics equipment. In fact, you may already have an X10 setup in your home if you have a home theater setup. You can use X10 networks to support security as well. You can find X10 security equipment at many Web sites including the X10.com Web site at www.x10.com/home2.html and the Smarthome Web site at www.smarthome.com/secx10wrls.html. 109

Chapter 4

An X10 system has advantages that are well outside the purview of this book, but well worth noting. For example, with the proper PC transceiver, you can use your PC to communicate with wireless X10 devices to perform tasks such as turning lights on and off automatically, or dimming them to meet a specific mood. You can use the same transceiver to work with any X10-compatible device, including audio and video equipment. In short, X10 is an incredibly flexible system, but it can also carry an equally incredible price tag.

Going to the X10.com Web site points out an important fact: you can literally get a camera to

meet any need. This Web site includes specialty cameras with a 120-degree lens and setups that include video recorders. Some of these systems also include an Internet connection so you can monitor your home while away. It appears that most of the units that provide Internet connectivity also require a PC to accomplish this task. Some X10 setups support an incredible number of cameras. A standard setup will normally support sixteen cameras, but you can add more.

Internet and Remote Monitoring Many cameras provide some form of Internet or remote monitoring. This is true of many of the cameras that appear in the “Wired Cameras” and “Wireless Cameras” sections of this chapter. For example, the Motorola Home Monitoring and Control System lets you monitor still frames

of video using your cellular telephone. This system also lets you send the images to your e-mail. The point is that you can monitor your home while on vacation in Jamaica without any problem. The problem with these systems is security. If you can access a device from the Internet, someone else can access it too. This means that an intruder can access your house without ever step-

ping foot in it. A voyeur can invade your privacy and you might never know it because this person is using the same techniques that you use to monitor your home. Consequently, once you install

any kind of monitoring that includes an outside connection, you must also be willing to provide

security for it. Security isn’t a onetime commitment either—it’s a continuing effort. You have to monitor the system for possible breaches and change passwords regularly as part of the effort to keep the intruder at bay. Time-Lapse Recording Sometimes you don’t want to use an alert system—simply recording activity around your home is enough. Time-lapse recording connects a camera to a recorder of some type—normally a video 110

ee

ee eee

Considering Custom Solutions

cassette recorder (VCR), but you can use any recording device including a combination of your

PC and a DVD recorder. The concept is always the same—to make a permanent record of the events that the camera witnessed for you.

Generally, you can connect any video camera to a VCR when the device includes support for a standard television. Likewise, any device that connects to a PC will usually let you record the action to a DVD. However, connectivity and ability to record doesn’t always mean that the result

is usable. Video recordings work better when you have the ability to control the action. For example, you may only want to record when the camera senses motion; this functionality requires some type of special control software. A few products come with everything you need to make video recordings. For example, the Motorola Home Monitoring and Control System and many X10 systems provide video recording capability out of the box. You don’t have to do anything special—just connect the cables, install the software, and make any required setups.

While a standard VCR does work for creating recordings and you can control it using special soft-

ware, what you might really want is a VCR with built-in special functionality for making time-lapse recordings. For example, Mitsubishi (www.surveillance-video.com/mit12hoursec.html) produces

recorders that can record up to 1,280 hours of camera input (a little over fifty-three days). Of course, the recording won't be real-time, but you can adjust the interval between pictures. You can adjust the VCR for better recordings at intervals of 8, 24, 40, 64, 96, 128, 160, 224, 320, 480, 640,

960, and 1,280 hours. It’s also possible to lock the image and view just one frame at a time—an

essential feature for recordings of this type. Surveillance-video.com (www.surveillance-video.com/index.html) provides a host of additional

camera products that you might want to include on your list. For example, the Sony 480-hour high-resolution

security recorder

(www.surveillance-video.com/sonsvts480es.html)

includes a

host of features that make it PC friendly (such as an RS-233, serial port, interface), which makes

controlling this system easier. This particular recorder includes a real-time mode that records up to twenty frames of input per second. The best part about this recorder is that it offers a cameraswitcher interface, so you can use a single recorder to monitor multiple cameras.

Multiplexing video cameras can become expensive. In fact, you might find it difficult to locate

precisely the equipment you need. Fortunately, you have resources available for building your solution when needed. Eric Gagnon wrote an article entitled “Simple Four-Channel Network Video Server” for the November 2004 issue of Circuit Cellar (www.circuitcellar.com/

own

aa

Chapter 4

magazine/172toc.htm). This article gives a full explanation of how the server works, includes schematics and software, and even provides resources for additional study.

Sound becomes important when recording images for later viewing. Not every camera setup that includes video connectivity also includes sound, so you'll want to verify that the camera includes this feature. In addition, not all sound setups are the same. The sensitivity and fidelity of the micro-

phone the camera provides is important. The sensitivity of the microphone affects its range, while the fidelity affects the quality of the recording. Both factors are important. It doesn’t help to get a recording of the intruder talking to a friend if you can’t make out what either party is saying.

Covert Video Systems Generally, covert video systems—those operated without the knowledge of the party you want to monitor—have a very negative connotation in society. Using covert monitoring does help you

catch someone in the act, but using such a setup can alsocost you considerably. People react negatively to spying, especially when they're the target. That said, you might want to use a covert

video system in some cases for purposes other than the unethical monitoring of people. For example, you might want to include a covert monitoring setup in sensitive areas of the home or

as a means of viewing wildlife around your home. Covert monitoring systems come in all shapes and sizes. You can find a covert monitoring system that looks like just about anything. For example, you can buy a system that looks like a wall clock

or a boom box. All of these systems are incredibly expensive, so you'll want to be sure you actually need one before you buy it. Sometimes, it’s better to have the camera exposed as a means of deterrence. One of the more interesting places to buy such a camera is Spy Cameras and Hidden Cameras at www.4hiddenspycameras.com. You can also buy just the camera and create your own covert camera setup. For example, the bullet camera at www.4hiddenspycameras.com/secbulcamins.htm] provides an excellent starting point for such a setup. You could create a birdhouse with monitor to see the birds at work with their babies. The hole through the birdhouse would also let you monitor outside activities. In short, you could use this setup to double the usefulness of the system. Window and Door Sensors

Window and door sensors are perhaps the simplest sensors that you'll work with. Essentially, the switch is controlled by a magnet, as shown in figure 4-3. Most models come with a normally open az

Considering Custom Solutions

Window or Door Switch

Closed

Contact

Normally Open

Contact

,

Fig. 4-3. Window and door sensors rely on a magnet to

open or close a set of contacts. Figure created by author.

and a normally closed contact. Make sure you read the vendor documentation carefully. Generally, the normally open contact is open when the magnet isn’t closing the switch as shown

in figure 4-3. You'll use the normally open contact when creating a closed-circuit system (see

“Deciding between Open- and Closed-Circuit Systems” in chapter 3 for details). When you do get a specific sensor, make sure it matches the kind of circuit you want to create.

The important issue about window and door sensors is to position the magnet so it closes the switch fully. You can’t see the switch, so it might seem that this is impossible. A perfect setup places the

magnet next to the switch, but this doesn’t occur in some cases. Most switch vendors tell you how

much space you can have between the magnet and the switch and still get a good connection. A good sensor allows 1/2 inch of space between the magnet and the switch; better and best sensors

will allow 3/4 inch of space. Motion Detectors

Motion detectors come in several styles. The three most common types use infrared, microwave, or ultraviolet light for detection. Each of these sensors works differently. You won't find much information about ultraviolet motion sensors because they're used for special purposes. Of the three sensor types, the infrared is the most common and the easiest to understand. You can find a good write-up of how an infrared sensor works on the Glolab Web site at www.glolab.com/ pirparts/infrared.html. Essentially, infrared sensors are passive—they don’t send out a signal of any 113

Chapter 4

kind. The sensor detects body heat as someone comes within range of the sensor. Infrared sensors

are the right choice when cost is a concern and you can limit the possible heat sources the motion detector encounters. For example, an infrared sensor might not be the best choice for a patio that receives more than a little sunlight.

Microwave sensors rely on transmitted energy to work. The device transmits a high-frequency signal and waits for the signal to return. It samples the signal and looks for any change in the fre-

quency. The Doppler effect lets the sensor detect motion. As an object moves within the microwave field, the frequency changes slightly and the sensor can detect the change. You can

read more

about this kind of sensor at www.ramseyelectronics.com/downloads/manuals/

MD3.pdf. In fact, you can find the kit for building a microwave motion detector on the Ramsey Web site at www.ramseyelectronics.com/cgi-bin/commerce.exe?preadd=action&key=MD3C.

The advantage of using a microwave sensor is that you can send the signal omnidirectionally (in all directions) and this detector doesn’t care about heat or other forms of interference. However,

a microwave detector can’t detect movement when someone maintains the same distance from the sensor because it works on the Doppler effect (of course, this also means the intruder isn’t moving any closer to your home).

Some vendors combine infrared and microwave sensors to create motion detectors with the best features of each technology. Even though these motion detectors cost most, they're well worth the extra money. The additional flexibility lets the motion detector perform additional tasks, such

as recognizing that your pet isn’t an intruder. Alarm Screen / Dual Window Sensors

One way to protect your house and still allow airflow in the summer is to use a combination of drop pins and multiple sensors. You drill holes into both sides of the window at an angle. When you open the window, you insert the drop pins to make it impossible to move the window any

farther. You place the drop pins in such a way that you need a magnet to remove them. The window also has two magnets. The first is in the closed position and the second is three inches up so

that the sensor matches either the closed position or the drop-pin position. Figure 4-3 shows how to set up this solution. An alternative to this setup is to use an alarm screen. The alarm screen has a wire running through it. Any attempt to remove the screen or to cut it to gain access will set off the alarm, so youll have to turn the alarm off to remove the screen for cleaning. You can see an example of an 114

Chapter 4 i ee i

Never assume that security system components are ugly, consume large quantities of electricity, or require professional installation. A little time spent online looking for unique solutions can net some interesting results. For example, you can add external lighting that won't cost you a cent in electrical power costs, requires almost

install, and

is aesthetically

pleasing.

.com/product.asp ?cid=22&p=28298)

no maintenance,

is very fast to

The Allsop

Firefly Solar Garden Art (www.allsopgarden is a fanciful solution that meets all of these requirements and

still manages to provide some of the lighting you need for external security. Even though this solution won't provide everything you need, it’s a step in the right direction.

alarm screen on the eAlarmScreens.com

site at www.ealarmscreens.com.

Other Sensors

There-are so many types of sensors on the market that it would be easy to write an entire book about them. However, not all of these sensors are practical for the homeowner. For example, you

can buy a wall vibration sensor, but it would probably go off every time a truck passed by your house. One of the best sources of information for these very esoteric sensors is the Perimeter Security Sensor Technologies Handbook (www.nlectc.org/perimetr/full2.htm). Some alternative sensors are useful for the homeowner. For example, you'll want to know when

flooding occurs or if the temperature of your home approaches a critical level. You might even want to know when the AC power fails so you can get home and start a generator (if it doesn’t

start automatically) or prepare to do something with all the food in your freezer. The following sections describe these alternative sensors.

Flooding Sensors Flooding sensors can check for a variety of flooding conditions. For example, you can stop flooding caused by a washing machine using products like Flood Stop (www.onsiteproducts .com). These sensors work by detecting an abnormal flow of water (either too long or too

much). All of these sensors automatically turn off the water to the attached device (such as a washing machine or toilet). Most of these sensors include an audible alarm that alerts you to

the problem. Some of the sensors also send a signal to an alarm or contact you directly. The 115

Chapter 4

Home Controls Web site at www.homecontrols.com/cgi-bin/main/co_disp/displ/carfnbr/173/ sesent/00 provides a long list of flood control devices.

Unfortunately, your washing machine or hot water heater isn’t the only place flooding can occur. Another type of flooding sensor uses a float to detect rising water in a basement. The rising water triggers a switch that sets off an alarm. The advantage of this setup is that it’s extremely simple and reliable. The disadvantage is that your basement already has several inches of water in it before you know there’s any trouble. Companies such as Sensorsoft (www.sensorsoft.com/sensors.html) make a variety of sensors that

use other methods to detect everything from flooding to increased temperatures. In the flooding sensor,

two probes detect a change in conductance.

Because

water is a great conductor,

this

device can register even a small amount of water, so you can react before the water damages the

carpet. Even though this sensor type is relatively expensive, it’s often the best solution when you can't tolerate any amount of water damage. An absence of water can cause problems too. For example, a pool requires water in it or the pump

will seize. A few vendors, such as Bass Home (www.basshome.com/category_274.htm), provide absence of water sensors you can use. These sensors tend to incur high maintenance costs, so use

them only if you really need them.

Temperature and Humidity Sensors Temperature and humidity sensors can help you prevent a number of security, safety, and health problems in the home. For example, when the temperature and humidity are both a little high, you

can experience everything from mold damage to loose wallpaper. However, more important is the fact that these conditions can also corrode contacts and cause other invisible damage that can cause appliance or electronic device failures. Of course, high-temperature conditions are not the only problem. Most houses in areas with harsh winters can also benefit from a low-temperature alarm. Freezing pipes are a significant problem in these areas. The Home these sensors.

Security Store (www.homesecuritystore.com) includes a number of

Consider the full range of environmental sensors at your disposal and use them for every need,

rather than relying on the narrow range defined by the vendor. According to Officer Tom Peters (see interview, chapter 3), common uses for temperature sensors include greenhouses, industrial areas, and agriculture (checking the temperature of hatching eggs, for example). A humidity 116

Considering Custom Solutions

checker can ensure that the humidity of a greenhouse isn’t too low, as well as ensuring that the humidity in your home isn’t too high. AC Current Monitors

Losing power can be catastrophic for some homeowners. You might have automatic devices running that require the power, medical equipment such as oxygen tanks, or a freezer full of food to

protect. No matter what reason you have for keeping the power on, an AC current detector can help you keep track of the power situation. Devices such as Power-Out sensor from Smarthome (www.smarthome.com/7154.html) can make this task easy. Simply plug the device into a socket

on the same line as the device you want to monitor and connect the output to your security panel. An alarm will sound whenever the power goes out on the monitored circuit.

DEVELOPING PHYSICAL SECURITY ELEMENTS Physical security can encompass many concerns. This book has already discussed a wealth of these issues, including the need to install a good door on your house and safe room, along with an equally good dead bolt (see “Defining the System Parameters” in chapter 3). The following

sections describe a few special issues for people who like to do things themselves. These issues

are in addition to those discussed in the previous three chapters. Fireplaces and Woodstoves Fireplaces and woodstoves add warmth and ambience to your home. In addition, careful use of a fireplace or woodstove can reduce your heating bills. However, fireplaces and woodstoves also

present significant risks to your family’s safety when used incorrectly. In fact, they represent such a significant risk because people don’t use them correctly that your insurance company will assess you more for home insurance on a home that has a fireplace or a woodstove. According to Firehouse.com

(www.firehouse.com/infozone/firesafety/factsheets/fireplace.html),

fireplaces

and woodstoves account for 36 percent of all house fires in the United States. This Web site also has a lot of good information on how you can use your fireplace or woodstove safely. You might see a few items that Web sites don’t explain fully. A flue thermometer is a special, magnetized device that you place directly on the stovepipe when the pipe is accessible. Place the thermometer after the damper (about six inches) so you obtain the true flue temperature. The thermometer will contain several sets of markings depending on the vendor. The too-cool zone Ay,

Chapter 4

is extremely important. Make sure your fire is hot enough to get past this zone or your chimney will build up excessive creosote—a burnable wood residue that can cause a chimney fire when ignited. However, make sure your flue doesn’t get past the too-hot zone either. Fires that are too

hot can cause the house to start burning from radiated heat, ignite any creosote in the chimney, stress the stovepipe (creating holes in it), and cause a number of other problems.

Many Web sites will specify that you should use a certified chimney sweep to inspect your fireplace and all of its supporting hardware, as well as clean the chimney annually, without ever

explaining what a certified chimney sweep is. A certified chimney sweep has attended specialized schools and knows how to both inspect and clean your chimney. A certified chimney sweep can also make repairs as needed. You'll find advertisements for chimney sweeps in your telephone book, but unless you ask, you won't know whether they're certified. Fortunately, you can

check for certified chimney sweeps in your area using the Chimney Safety Institute of America Web site at www.csia.org/homeowners/sweeps.htm. Most Web

sites will tell you to burn clean, dry, hardwood

in your fireplace or woodstove.

However, they don’t really say too much else about the topic. The biggest mistake you can make is to burn pine in your fireplace or woodstove. Pine, especially the kind used for construction, will burn fast, produce little usable heat, and create a creosote buildup in your chimney faster

than any other wood. However, simply ordering hardwood from someone doesn’t quite solve the problem. Make sure the hardwood has seasoned (dried) for at least two years. Visually inspect

the wood. Any mold or other fungus signifies wet wood—don’t and feels drier than green wood. Good woods to burn include ing woods include cherry, sycamore, and elm. The best woods In fact, if there’s a perfect wood, locust is it—it produces few

accept it. Dry wood is also lighter birch and box elder. Better burninclude ash, hickory, and locust. sparks, little smoke, doesn’t have

much of a smell, yet produces more heat than just about any other wood you can find. However, you should mix woods when possible to get better burning characteristics. White elm and locust are very hard to start burning but produce a lot of heat when they do. Mix these very hard woods with maple or even a little pine to start the fire (never burn pine continuously, however). You can find detailed information about the characteristics of various woods at http://ianrpubs.unl.edu/ forestry/g881.htm. Window Bars

Window bars are a very good means of protection, but they can also cause significant problems

when you don’t install the proper level of protection. According to the Home Safety Council 118

ae pete

Bl

Considering Custom Solutions

Web site at www.homesafetycouncil.org/safety_guide/sg_fire_w006.aspx, you should install win-

dow bars with a quick-release mechanism. The window bars are still on the outside of your house; the quick-release mechanism makes it possible to release the bars only from the inside of the house, not the outside. This Web site has other suggestions for window bars that you should consider.

ENABLING THOSE WITH SPECIAL NEEDS You already know from previous chapters that you need to include various kinds of panic buttons in the home. Generally, these devices let someone in the house signal the need for fire, police, or medical help. When you create a custom solution, you can use any combination of the technologies discussed so far. In most cases, the security panel will include the panic buttons, but you can also add remote stations. Determine whether you want to use wall-mounted switches, a per-

sonal pendant, or a combination of both. However, simply providing a panic button might not be enough to provide those with special

needs full awareness of their environment. Installing a telephone or doorbell detector can improve security a great deal because someone with a hearing or visual impairment will have an additional cue that someone is trying to contact them. Most telephone and doorbell detectors, such as the one shown

on the Elk Products Web

site (www.elkproducts.com/products/elk-

930.htm), work with two doorbell buttons and one telephone circuit.

Make sure you choose the right kind of telephone detector. Cellular telephones can interfere with a wide range of medical equipment, some of which can appear in your home. Another type of telephone detector detects the presence of a cellular telephone and lets you inform the wearer

about the problems it can create before they happen. You can see such a device on the RFI Industries Web site at www.ferret.com.au/articles/26/0c01e226.asp.

Doorbell and telephone detectors aren't just for those with special needs. Someone with a workshop can also use these devices to improve safety. It’s hard to hear a doorbell or telephone with a saw going. The visual cue these devices provide can let you know when

someone's at the door or trying to call you.

119

Chapter 4

Let’S START SECURING This chapter has helped you understand the requirements for creating a custom security solution and addresses several security scenarios. It’s important to consider pitfalls in your plans and have alternatives in mind before you start. The majority of the chapter discusses various kinds of sensors. Although the chapter contains an overview of the sensor types and describes some types in detail, bear in mind that other sensors are available—too many to discuss in one book. Make sure

you spend some time at your local home center, browsing through a security vendor catalog, or surfing the Internet in search of additional information. It’s time to get started on creating your custom system. By the time you finish the plan, you should have several new pieces of information in place. Even though you haven't actually installed anything yet, you should know where you want to install every sensor, the sensor ven-

dors you want to use, and precisely how the sensor will work when installed. You should also have an accurate price estimate for your security system.

Chapter 5 addresses specific installation requirements. By the time you finish chapter 5, you'll

have everything needed to install your security system. All you'll need to do at this point is perform the actual work. Of course, installing the security system isn’t the end of the road, but at

least you'll have something in place—a security system that you can use. Consider chapter 5 a major milestone on the way to completing a fully functional security system.

120

INSTALLING THE HARDWARE

ou've created a plan, you know precisely what you want to do, and you've gathered the

Miers hardware; it’s time to begin installing your security system. When you depend on a

third party to perform the installation as outlined in chapter 2, you don’t even need to read this chapter—the vendor will do everything for you. Of course, you can always read this chapter if you're curious. People who want to install part of the system (chapter 3) or perform the entire task themselves (chapter 4) will need to read all, or at least the pertinent parts, of this chapter.

Like most hardware and software setups, security systems require several installation phases. You'll begin by making any required preparations for your particular security system. After that, you'll install the hardware, which means selecting equipment locations, assembling all of the required materials at each location, and mounting the equipment as needed (usually to the wall or ceiling, but you might also need to work with the doorjamb or other parts of the house). Once you have the equipment in place, you'll need to run cables to at least some of it. Yes, wire-

less installations require a lot less cable, but you'll still need to run some wires to make the system work. Some people run the cables before they install the equipment. This has the advantage of letting you change the equipment locations easily if you run into a problem running the cables according to the original plan. If you want to run the cables first, simply follow the instructions in this section first. 121

Chapter 5

The next step is to add any required physical security. You can perform this step first or second, but performing it after you have the security hardware in place ensures that none of the physical security you install interferes with the proper operation of the security equipment. For example, you might put bars on a window, only to discover that a sensor or camera won't install properly afterward.

Finally, you'll perform any steps required to secure the system and configure the software that runs it. Depending on your setup, this part of the system installation can become tedious. Some

vendors provide good instructions; others provide material halfheartedly translated from another language. The number and type of sensors, the kind of alarm system you use, and the presence

of multiple monitors can complicate the setup.

UNDERSTANDING THE SECURITY SYSTEM TYPES From a hardware installation perspective, devices are either hardwired, which means they have a physical cable connecting them to the alarm system, or wireless, which means they use radio

waves or other technology to create a nonwired connection to the alarm system. Each of these technologies has advantages and disadvantages from a security perspective, as described in previous chapters. For that reason, you might end up with a mix of hardwired and wireless devices in your security system. If you decide to go this route, make sure your security system, especially the control panel, can accept both connection types. However, the important point for this chap-

ter is that hardwired devices use a slightly different installation methodology. Hardwired Systems

Hardwired systems can present problems. You need to know where you can run the cables without letting them show. Generally, you need to run the cables through walls to ensure they remain protected and out of sight. Because the cables used for sensors are small (about the size of a telephone cable), you can also run them along window frames and other natural room features. You

can still see the cable, but by painting it, you can make it less noticeable. Besides all of the security features that hardwired sensors can provide, they also provide one

installation plus. It’s easier to set up security zones within your home using hardwired setups because you can see where every sensor connects. As shown in figure 5-1, you normally set the sensors up into zones. You wire all of the door and window sensors, glass break sensors, and 122

Bathroors WD" x & 6%

Living Reon

4

i

Mosier Sedroam

Zone 1

Zone 2 RY 8% 2 16° 8°

6' 0” x x7' 0" Sning Hoorn

Richer

39° O° x 1 6

48° G" x t2' 0%

Fig. 5-1. As part of the installation process, create a diagram showing the security zones

in your house. Figure created by author.

123

Make sure you set the zones up carefully, especially if you have children or pets to consider. For example, if your dog will stay in the kitchen during the evening hours, you'll want to make sure that the kitchen is in a separate zone so you can turn just that zone off. When a child needs to use a hallway to go from the bedroom to the bathroom or your bedroom at night, make sure you set that path up as a separate zone as well. The goal is to set the zones up in such a way that you can remove security from just those areas of the house that you need to use at

night.

motion detectors in one zone together. (Other security aids, such as cameras, always provide sep-

arate leads to the security system.) Using zones makes it easier to detect precisely where an intruder has entered the home and makes wiring the sensors together easier.

Notice from figure 5-1 that you don’t necessarily use one zone per room. An important such as the bedroom, normally requires its own sensor. However, you can group common into a single zone. In this case, the dining room and kitchen appear in a single zone because into either room is a breach of security from the back of the house. The living room is in arate zone because there aren't any other rooms in the front of the house.

room, areas entry a sep-

Generally, hardware wiring schemes require little or no configuration because of the physical con-

nections between units. Once you attach and wire each sensor, you're finished—the system is ready to use. Most of the planning for a hardwired system goes into ensuring that the wiring will get to where you need it.

You do need to pay attention to one important detail when working with hardwired systems. The sensor might need power froin the central control panel to work. Make sure that the output voltage of the central panel matches the input voltage of the sensor. The two common voltages are 12 VDC and 24 VDC, but some sensors require other voltage levels. Wireless Systems

Wireless systems rely on battery-powered sensors that use some type of nonwired communication strategy, normally radio frequency (RF) transmitters and receivers. The basic advantage of

using a wireless setup for the installer is that you don’t have to run any wiring to the sensors. In addition, you can easily take a wireless system with you when you move. The only thing left 124

Installing the Hardware

behind is the screw holes used to secure the sensor to a wall, ceiling, window, door, or other location.

Like hardwired systems, wireless systems use a zone setup similar to the one shown in figure 51. However, there’s an important difference. Without wires to define the zone locations, you must configure the central controller to recognize every sensor in the home. You associate each sensor number with a particular zone, which means that you must record the number of each

sensor before you install it. The focus of the installation is getting the configuration correct. One wrong entry could signal an alarm in zone 1 when the intruder is really in zone 3. In using a wireless setup, but not a hardwired system, you must consider the location of the cen-

tral controller carefully. Wireless sensors have range limits that you have to consider as part of your setup. In addition, the sensors can suffer from electromagnetic interference (EMI) from sources such as radios, televisions, and telephones. You need to consider sensor placement care-

fully to avoid potential interference problems. If you install one of the few wireless systems with an automated call-up feature, you'll need to

perform additional configuration. The automated call-up feature will call police, fire, or some other responsible party when an alarm occurs. You need to provide a prerecorded message and ensure that the system doesn’t continuously generate false alarms. Some of these systems, such

as those on the X10.com Web site at www.xl0.com/key_products/home-security.htm and www.x10.com/key_prod ucts/ds7000.htm, provide a camera you can use to verify the presence of an intruder before you call police. In fact, the About Web site at http://apartments.about.com/ od/securitysystems/ has a list of vendors that provide systems like this for apartment dwellers. When you install a wireless system that provides a call-up feature, have it call you so that you can verify the presence of an intruder before you call the police. Some X10 systems allow you to “listen in” to aid in making a determination of the next appropriate action. Using the listen-in feature is good alternative when a camera is not available, but you'll have to perform additional installation chores to obtain this feature.

INSTALLING THE SECURITY SYSTEM Depending on the kind of system you want to create and your personal preferences, you'll install either the wiring or the security system components first. It doesn’t matter which element you install first. The major factor is deciding which approach is easier for you. This section concerns 125

Chapter 5

itself with general security components—window and door sensors, motion detectors, glass break detectors, and so on, along with the central controller. The following sections describe all of the

requirements for installing these devices for either a hardwired or a wireless installation. Considering Equipment Locations

You need to make a number of decisions when locating a piece of equipment. The equipment location must address aesthetic, functional, physical, and environmental concerns. In addition,

you must ensure that the location meets local code requirements and won't invalidate any vendor warranty. It’s important to consider all of these needs and still provide a place that has any power required by the device. The easiest equipment location concern to address is the aesthetic. Most people have a good idea

of what they'll tolerate as a security equipment intrusion and what they won't allow. The security equipment has to perform its function, in most cases, while the least intrusive possible—unless, of course, you really like your electronics to show as a kind of fashion statement.

Functionality is one of the more difficult concerns to address. A functional location for one person won't necessarily address someone else’s needs. Consider the issue of height—someone who’s short will require a lower setting than someone who’s tall. Placing the central controller near a corner might seem like a good idea until you actually try to access the panel features or view the security information. If nothing else works, create a cardboard mockup of the devices that you have questions about and try different wall locations. At some point, you'll find a wall

location that precisely meets your functional needs.

Most security equipment isn’t very heavy, so you don’t often have to consider the equipment weight. However, some equipment either is sensitive to vibration or does have a weight limita-

tion. The central controller can weigh quite a bit, depending on the features you get with it. Consequently, you'll want to ensure that the central controller has at least a few screws firmly in

a stud. This means using a stud finder to locate the right place for the central controller. Because studs occur at sixteen-inch intervals, in most cases, you should be able to place the central con-

troller near the location you originally visualized and still provide the support it needs. Always check the vendor documentation for concerns about vibration. Again, use a stud as an anchor to keep vibration at a minimum. It’s important to consider environmental factors when choosing a location for your equipment. For

example, sunlight can become a problem for various reasons. A security panel can become unread126

fe Sek ad

Installing the Hardware

Always have a Plan B location for a sensor that you suspect might encounter environmental problems. If you find that the sensor registers an inordinate number of false alarms, move it to the alternate location. Choosing the right location for a piece of equipment Is essential, so having multiple locations in mind can help you overcome problems quickly.

able when sunlight hits it. Sunlight and its attendant heat can cause problems for some sensors, such as motion detectors that rely on a passive infrared (PIR) sensor. Yes, the sensor will likely con-

tinue working, but at a reduced range. Drafts and other environmental changes can cause problems as well. Placing a smoke detector in the wrong place can also create problems. Avoid placing the sensor directly in front of a bathroom door because the steam can set the sensor off. Assembling the Materials It’s tempting to start installing your security system one piece at a time, but that approach can

lead to errors. You want to focus your attention on the installation once you start it to ensure that

you get a good installation from the outset. Assembling all of the materials you need to install a particular component is an important preinstallation step. Not only will this approach make the

installation go faster and reduce errors, but you'll also have fewer frustrating interruptions. Assembling the materials means doing more than simply finding the device you want to install. You need any support hardware (including the right kind of screws or other fasteners) and per-

haps some cables or other consumables. Place all of the required tools in one place. Include a level (so you can verify the device is straight) and a ruler with your tools. Make sure you have

simple tools such as a pencil for marking the device location. When working outside, make sure

you know how you'll seal any holes you create during installation and have those materials available as well.

Open each device box in turn and check it for the materials required for installation.

A complex

device will come with a packing list you should use to verify the content of the package. Look for the fasteners required for each device and ensure they're the correct type. Most vendors assume that you want to install a device on a wooden surface, so they include wood screws. When working with a wall-mounted device, you'll likely require anchors and the associated screws, so it’s

important to address these additional needs before you begin. Always use the correct fastener 127

Chapter 5

type when mounting a security device. The anchors you use on interior walls might not work well on exterior surfaces such as brick. You'll need other kinds of fasteners when working with poured concrete walls, such as those found in a basement. Your local hardware store can usually make good suggestions on which fasteners to choose for a particular application.

Some environments require special preparation. Surfaces could require cleaning to remove dirt prior to mounting the new device. Include sandpaper (one piece each of 80-grit and 220-grit)

and a scraper in your supplies. In many cases, a device won’t mount correctly on a bumpy surface. You can use the scraper and sandpaper to prepare the surface to accept the device. Use the coarse sandpaper (80-grit) to smooth the surface and the fine sandpaper (220-grit) to remove the sanding marks. Of course, you'll want to prepare the surface in a way that doesn’t detract from

the overall appearance of the installation. Sometimes you'll need to become creative to maintain a great appearance and still provide the required mounting surface. Performing the Installation

At some point, you'll have everything needed to perform the installation. Always read the installation guide for every device before you install it. You want to create the best possible installation, so it's important

to follow vendor

instructions

and recommendations.

Here

are

some

additional helpful tips you can try. e Always remember to measure twice and cut once. Verifying your measurements saves time and effort repairing mistakes. The same rule holds for other activities—measure twice, drill once, and so forth.

e Read the instructions, and then read them again. It requires less time and money to

ensure you understand a procedure than to repair or replace a device that you installed incorrectly later. ¢ Go slow. Hurrying will cause installation problems that will take additional time to correct later. * Try to hide your wiring using attics and crawl space. However, you don’t always have a convenient place to hide the wires, which is where wiremold comes in handy. Home cen-

ters and hardware stores carry products designed to cover wires. These products mount to the wall and are generally easy to paint. This option can become expensive. You can see an example of wiremold on the Wiremold Company Web site at www.wiremold.com /www/commercial/products/index.asp and the National Electrical Manufacturers Association (NEMA) Web site at www.nema.org/mfgs/Wiremold.cfm. 128

Installing the Hardware

Unfortunately, sometimes the vendor instructions don’t include every detail. The following sections provide some tips and hints you can use to get a perfect security system installation. Use these instructions in addition to those supplied by the vendor.

Working with Templates Getting the equipment on the wall, ceiling, or other location can be difficult, especially when it

weighs twenty pounds and you have to hold a drill in the other hand. In many cases, the equipment you install will come with a template—essentially a picture of the back of the device. Simply tape the template to the installation location, make sure you have it positioned correctly (including making sure the template is straight), and drill the holes for the device. The vendor normally

hides the template in the equipment documentation, so you'll need to search the package for it. In some cases, you won't get a template. Rather than build your muscle holding the device up, you can create a template to place on the wall. Simply place the equipment with the front facing you on a paper shopping bag and trace the outside. Trace the mounting holes next. Make note of any cutouts for electrical cables so you place the equipment for best access to any cable you have already run. Remove the equipment from the shopping bag. Use a ruler to find the vertical and horizontal centers of the equipment. Draw lines so that you know where the centers are. Cut the pattern out and use it as you would any other template.

Drilling Screw Holes The one power tool that you'll likely need for all installations is a drill. A battery-powered drill is best, and you should get one with enough power to drill in the surfaces around your home. Of course, the drill merely provides the power for the drill bit that performs the actual work of mak-

ing a hole. Not all drill bits are the same; you need to match the drill bit size to the task. When choosing drill bits for screws that bite into a surface such as wood, use a bit that’s the same diameter as the screw shank. You should be able to see the screw threads on either side of the

drill bit when you hold the drill bit and screw together (drill bit in front so you can see it). Choosing a smaller drill bit makes it difficult to insert the screw and choosing a larger bit reduces the screw’s holding power. Anchors and other kinds of fasteners require other size holes. Use the

vendor recommendations when choosing a drill bit for anchors and other fasteners. Unfortunately, not all vendors provide instructions for using their fasteners because they assume youre a professional. Many companies, such as Woodcraft (www.woodcraft.com/family .aspx?familyid=3215&refcode=05INF ROO&PRID=Fr¢gl3215), provide gauges, charts, and 129

other devices for matching a screw size to the appropriate drill bit. Use one of these devices when necessary to avoid using the wrong drill bit size. Some people use tapered drill bits as described at www.bitsnbores.com/html/why_use.html for wood screws instead of standard twist drills. These drill bits really do provide superior holes for wood screws, but you don’t have to use one

for mounting security devices unless you already have the bit available. Finally, you can find a number of charts online for matching specific screws with the appropriate drill bit, such as the

one on the rec.woodworking FAQ Web site at www.robson.org/woodfaq/woodfaq_5.html.

Not all drill bits are appropriate for every task. You can use a standard twist drill to make holes in metal, plaster, and wood. However, if you need to make a hole in concrete or brick, you'll want

to buy a masonry drill bit. These bits have a special hardened tip that lets them drill into the harder masonry surface. The Knowing Your Drill Bits Web site at www.diydata.com/tool/drill-

bits/drillbits.htm contains a good description of drill bit types. Fishing Cables and Wires through a Wall Many people won't have the luxury of installing the cabling and wires for their security system in a home that doesn’t have the wallboard installed yet. Consequently, you need to fish those cables and wires through the voids created in the wall by the combination of studs and wallboard. You have a number of options for performing this task. A fish tape such as the one shown on the Smarthome Web site at www.smarthome.com/9066.html works well, and you can get it at any

hardware store. Some specialty devices, such as the fishing cable shown on the Pacific Custom Cable Web site at www.pacificcable.com/More_Pages/Wire_Puller_Tool/Fishing-Cable-Through-Wall.html,

can

make the job a little easier. This Web page also provides some hints on using the device to fish cables. You might also want to check out the Wall Weasel shown on the EC&M

Web site at

www.ecmweb.com/mag/electric_fishing_wire_walls. This device can even bore through obstructions with a special attachment.

Fishing a cable through a wall requires patience. You probably won't succeed on the first try and might not succeed after several tries, but with enough patience, you can accomplish the task. The

CornerHardware.com Web site at www.comerhardware.com/howto/ht039.html provides good tips on fishing cabling through a wall. In addition, you might want to view the step-by-step instructions (complete with pictures) for installing Ethernet on the Home PC Network Web site

at www.homepcnetwork.com/wirest1f:htm. 130

Both Web sites are helpful for anyone who hasn't

Installing the Hardware

installed electrical, category 5, RG-6, or other types of cabling before. The “Running Cables” sec-

tion of the chapter provides additional details on running cabling for your security system. Multiple Fire Alarm Considerations

Some houses are too large to rely on a single fire alarm. In fact, you should use one fire alarm per threat area. For a good level of fire detection, include a smoke detector in the bedroom areas. A better level of fire detection includes a rise of heat detector in the kitchen. The kitchen should have some kind of fire sensor—don’t use a smoke detector in this case. The best level of fire

detection includes additional fire detection sensors. Place a smoke detector or a rise of heat detector in the area of the house that contains your furnace and water heater. Use another rise

of heat sensor in any room with a fireplace or woodstove. In short, many homes that have just one smoke detector have inadequate protection; you need several sensors in the typical home to

provide the best protection. Unfortunately, a sensor alone doesn’t guarantee that you'll leave the house in time to avoid dis-

aster. The fact that these sensors are connected to a monitored security panel and have an audi-

ble alarm might not help very much either, especially when the sensor is in the basement or even outside (the location of choice for water heaters in some places). One of the installation details you should consider is connecting the fire sensors so that if one sensor detects an alarm, all of

the fire sensor audible alarms go off. The technique you use to connect fire alarms depends on the sensor that you use, so make sure you check this detail if you want to use multiple fire sensors. In most cases, you connect the sen-

sors together using a special third wire. This signal wire lets the various sensors communicate without problem. However, some companies offer alternatives to using the third wire. A power

line smoke detector interconnect module such as the one shown at www.cepcoproducts.com/ sai.html lets you connect multiple fire sensors without adding the third wire. In fact, this option is a good choice when you want to add more fire sensors to an existing setup that doesn’t include

the third wire.

SECURITY CAMERA COMPONENTS

Security cameras can be the most difficult part of a security system to install, so they require special treatment. Not only is the security camera a relatively complex security device, but it also faces a number of environmental factors that some other devices won't face. For example, cam£

131

Chapter acl a

5

a

SE

OE

Pete

Avoid using plastic mounts for your security cameras, especially if you need to mount them in a retatively inaccessible area or if you live in a climate that has higher- or lower-than-normal temperatures. The plastic mounts tend to degrade quickly, increasing maintenance

costs

and

security

headaches.

Most

security

product

stores,

such

as

Smarthome

(www.smarthome.com/7522.html), sell metal mounts.

eras don’t respond well to pounding rain if the vendor or you don’t seal them properly. Cameras also require additional support within the home, especially when you have multiple cameras set up throughout the property. Camera Considerations

Security cameras come in all sizes and shapes. They also come with differing capabilities and features. The options you choose determine not only how difficult it is to install the camera but also how much help you can expect from the camera. A wireless camera is easier to install than a wired camera, but it’s also easy to interfere with the operation of a wireless camera and inter-

cept its output. When choosing between wired and wireless, you have to consider the camera location and determine how you can run any required cabling. For example, you can attach the camera to the soffit (the area under the roof overhang) for protection and easy cable running. The soffit doesn’t normally have any insulation in it, so you can run the cable from the camera directly into the attic and then route it from there as needed. Make sure you mount the camera directly to a framing member with substantial screws to keep the unit steady when the wind is blowing. Exterior cameras often have to work in low-light conditions. In fact, you might want to include

one or two low-light cameras in your setup. The camera’s lux value tells you how well the camera works in low-light conditions. The closer the lux value is to 0, the better the camera works in

low-light conditions. In some cases, a camera will augment the light with infrared beams, which are invisible to the human eye but quite visible to the camera. These cameras work in complete darkness and offer a 0 lux rating. However, no matter how good the camera, you can sabotage it by placing the light source in the wrong location, such as behind the camera or pointing directly

at the camera lens. Place the light source in front of the camera or at an angle to the camera so that light can bounce off the intruder and into the camera lens. 132

=

Installing the Hardware

If you live in an area where the temperature is lower or higher than the recommended operating temperature of the camera, make sure that the camera includes a heater

or fan as appropriate or has a heater or fan as an option, or that you can install a heater or fan in the enclosure. High-quality enclosures include both a heater and a fan. In some cases, you can save money by getting a less expensive enclosure and buying a heater or fan as needed. For example, the enclosure on the Camera Superstore Web site at www.camerasuperstore.com/metocam hou1l.html sells for considerably less than other enclosures you might find, but you have to buy the heater and fan separately.

Wide-angle-lens cameras can also create special setup problems. You don’t want to place anything in the way of the lens or adjust the lens so a building or other visual element obscures part of the view. Generally, make sure you have a full range of adjustment available for wide-anglelens cameras so you can point them at the correct location for viewing your property after you connect everything. (With some cameras you can make only small changes in the position of the camera after you mount it—some don’t offer any movement at all.)

Any camera you install outside must have a protected enclosure—cameras aren’t water friendly. Many cameras say you can use them for both interior and exterior applications. However, read

the fine print carefully. The majority of cameras on the market are water resistant—not water-

proof. When you install a water-resistant camera outside, you must provide some type of deflector to ensure that the camera doesn’t flood during heavy rains. The more it rains in your area, the better the deflector you must provide. The deflector can also help keep water droplets off the camera lens. Make sure the deflector doesn’t interfere with the camera’s view. A good deflector is a simple partition that protects the portion of the camera facing out from the wall; you can build it by adding a simple wood extension to the fascia and painting it to match your trim. A better deflector will protect both the back and the side of the camera using wood, metal,

or plastic panels. The best deflector is a metal or plastic box intended for the purpose that protects the camera on all sides except the front where the camera lens peeks out to capture images. You can find the required enclosures on Web sites such as D-Link at www.dlink.com/ products/?sec=0&pid=379 and StarDot Technologies at www.stardottech.com/wincam_live/out door_enc.html.

Choosing the right camera enclosure is very important when you live in a high-crime area. Many 133

Chapter 5

vendors provide vandal-resistant cameras. These camera enclosures typically sport impact-resistant

glass that will deflect a .22 caliber bullet and include any of a number of means for protecting the camera should the intruder decide to swing at it with a baseball bat (or other handy object). You

can find vandal-resistant camera enclosures online at Web sites such as Security ProShop.com (www.securityproshop.com/category_main.asp?cat_id=37).

Pan, tilt, and zoom (PTZ) cameras are better than fixed cameras for some applications because

they allow you to adjust the view as needed. For example, when you have a problem area around your home where someone could hide from a fixed camera, a PTZ camera can make hiding impossible. Unfortunately, standard outside enclosures won't work in this case because the cam-

era has to move around to fulfill its task. Make sure you get a PTZ camera specifically designed for outdoor use, such as the one shown at the Surveillance Video Web site at www.surveillance video.com/samscsmarout.html.

Notice that this camera is in a tightly sealed dome enclosure,

making it weather resistant no matter where you place it. Night-vision cameras designed for home use rely on infrared illuminators to provide a lighting source. Unfortunately, you can’t see infrared light. You have to set up and connect these cameras before you can see the effect of the illumination. To set up these cameras and their associated illuminators, you must work at night. Perform the basic setup during the day and then complete it at night. Begin by turning on any lights required to make changes, turn out all of the lights except the illuminators, test the setup, and repeat as needed to obtain the correct setup. Multiplexing and Transmission Multiplexing is the act of accepting multiple inputs, combining them so that you can recreate the

individual data streams later, and outputting a single data stream with the multiplexed data. Whenever you have more than one camera installed on your property, you need to provide some

type of multiplexing functionality. You can obtain standard, better-level multiplexers from Web sites such as Security ProShop.com

(www.securityproshop.com/category_main.asp?cat_id=33)

and Surveillance Video (www.surveillance-video.com/quadmul.html).

In some cases, you won't need to provide separate multiplexing. Many digital video recorders (DVRs) offer multiplexing capability of up to 480 frames per second (fps). Using this setup, you

can have up to eight high-quality inputs of 60 fps, sixteen standard-quality inputs of 30 fps, or 240 low-quality inputs of 2 fps. DVRs also offer many features you won't obtain with an analog setup. They provide better resolution in most cases, so your high-resolution camera actually pro134

;

Installing the Hardware

Not everyone wants to buy a digital video recorder off the shelf. Fortunately, you have

the option of building your own. The Circuit Cellar article entitled “Build a Digital Video Recorder” provides detailed instructions for building your own setup. You can learn more

about this option at www.circuitcellar.com/magazine/174toc.htm.

duces high-quality images, and they offer the same playback quality over time, whereas analog recordings degrade even in storage. DVRs tend to provide a good level of multiplexing. From an installation perspective, if you use a DVR with a built-in multiplexer, you don’t have to buy, install, and configure a separate device. The DVR doesn’t require any special mounting, and

you can easily keep it safe in a bedroom or other monitoring area. You run the output of the DVR to your video monitor and use the DVR to switch between cameras. Of course, because the DVR has all of the input cables coming to it, you'll see many cables that you can’t easily hide hanging

out the. back of the device. It’s a trade-off between aesthetic appeal and convenience. The best level of multiplexing occurs when you invest in a full-sized multiplexer designed for use as part of a security station or other dedicated setup. You can use these multiplexers to provide output for more than one video monitor. For example, the Panasonic WJSX150A 16x4 Matrix System

at WebCamProShop (www.webcamproshop.com/product/main.asp?pro_id=335) lets you monitor sixteen cameras using four monitors. This system includes a number of advanced features, including the detection of lost input feed from the cameras. However, always look at the fine print for a

multiplexer. In this case, you need to couple the multiplexer with a PC to perform tasks such as

changing the system settings. This requirement limits the selection of installation locations for the multiplexer in your home.

From an installation perspective, you have to choose a location that will support all this cabling. The same location has to provide support for any DVRs you want to use, the video monitors, and any controllers you install. The camera cabling can become unsightly unless you provide a proper enclosure for it, cabling support along the run in the form of cable clips, and cable ties to group cables and keep them manageable. You can obtain these cabling accessories on many Web sites, including the HomeTech Web site at www.hometech.com/techwire/wiremgmt.html. Note that

the cable ties sold on the HomeTech Web site include a screw hole, so you can attach the bundle to a wall or other support. In addition, this Web site sells a cable tie gun that definitely saves 135

Chapter 5

your hands when working with multiple cables (the cable ties tend to dig into your hand when you tighten them). Video Monitors

Installing a video monitor is relatively simple—you just plug it in. However, you need to consider

a few caveats as part of that installation. The video monitor must match the system. When you use a high-resolution camera, multiplexer, or video quad, you need a high-resolution video monitor to go with it. The term “high-resolution” is nebulous, unfortunately. The video monitor resolution

must be equal to or higher than the output resolution of the devices to which you connect it. In addition to providing the correct video resolution, the video monitor must contain circuitry to interpret the high-resolution camera,

multiplexer, or video quad output. Common

include National Television System Committee

(NTSC) (the common

States), phase alternation line (PAL) (the common

outputs

output for the United

output for Europe), sequential color and

memory (SECAM) (the French television standard), NTSC4.43, PAL60, PAL-M, PAL-N, and various high-definition television (HDTV) formats. When the video monitor connects to a com-

puter, it must provide the functionality required to interpret computer output. The video monitor is the easiest part of the security system to obtain and install. You can see some examples of video monitors commonly used for security systems on the Security ProShop.com Web site at www.securityproshop.com/category_main.asp?cat_id=22 and Smarthome Web site at www.smart

home.com/monitor.html.

Many people have trouble adjusting the video monitor. Many newer video monitors include a test display you can use to adjust the color, but brightness and contrast are also important. Adjust the

brightness (intensity) so you can see the display clearly but can’t see the scan lines. Otherwise, you can see things in the image that aren't there. Adjust the contrast to provide discrete levels between the brightest and dimmest colors. The goal is to see everything the camera sees without introducing anything else. Video Modulators

At some point, your installation becomes a matter of matching everything up. In many cases,

you'll find that you have lots of interesting inputs and places that you can use for outputs but the circuitry isn’t compatible. One of the most common problems is getting your DVD, camera, or other device to work with a television that lacks RCA inputs. You can use a video modulator to 136

Installing the Hardware

overcome this problem. The video modulator accepts the video and audio signal from the input device, converts it to a television signal, and outputs it to the television. As far as your television is concerned, it received the input from an antenna or other standard source. You can find an assortment of video modulators online at Web sites such as Smarthome at www.smarthome

.com/av_mod.html. Accessories

You can find a wealth of video accessories online, and this chapter simply doesn’t have room to

discuss them all. Consider this section an overview of the more important accessories. Exploring the vendor Web sites mentioned throughout the book and in appendix A is the best way to find everything you need and perhaps a few items that you don’t need but that will provide the extra pizzazz you want for your security system.

An important accessory for reducing the cost of a system with multiple cameras is the video quad. A video quad combines four camera input signals into a single video monitor output. You see the output of each camera in one quadrant of the monitor. With this technique you won't see a fullsized picture of each camera; the video quad reduces each picture to one-quarter its normal size.

However, you save money by not having to buy an expensive multiplexer and you can view all four cameras at one time.

Some video quads, such as the Appro Color High Resolution Quad Processor FIO-8046 shown at www.surveillance-video.com/apcolhigresq.html,

include a number

of special features. For

example, this device provides high-resolution output, which means that you don’t lose as much detail when viewing four cameras at one time. In addition, this device will let you view one cam-

era in full-screen mode. You can tell the device to switch between cameras automatically at oneto thirty-second intervals. When you choose a high-resolution option such as this one, make sure your video monitor can accept the output.

It’s also possible that you'll need an assortment of controllers to work with the video equipment. The two most common controller types are for the DVR and for the PTZ camera, but you can find other controllers. When working with a DVR controller, you want to modify the way the

DVR presents information. The controller normally lets you view images one frame at a time, scan quickly through images of less importance, and zoom in to specific image features. A PTZ camera controller lets you pan, tilt, or zoom a specific camera using a single control. The

control lets you choose which camera to modify, but you use a single control to work with all of 137

Chapter 5

the cameras. You can see examples of a number of controllers on the Security ProShop.com Web site at www.securityproshop.com/category_main.asp?cat_id=33. You might need other accessories to complete the video component of your security system. For

example, you can add an option to certain types of video cameras that lets the camera send you an e-mail every time it spots someone at the door. Other specialized accessories make it possible to send both power and data over the same cable, so you only need to run one cable (instead of

two) to each security camera. You might even want to add special functionality to send security camera output directly to your PC. The Smarthome Web site at www.smarthome.com/ pantilt.html provides examples of all of these special accessories.

RUNNING CABLES Every security system installation requires cables for some tasks. For example, the central station requires power and you must connect it to the telephone system. Consequently, even if you use all wireless sensors, you still need to run cables. Many people don’t really understand how a carpenter constructs a wall or ceiling, and this lack

of understanding can lead to problems in running cables. It isn’t good enough to know that the

wall relies on studs for supports and that there’s a jamb lining each doorway. Most older homes, and some newer ones as well, rely on fire-stops within the walls to control the spread of fire. The

presence of a firebreak can make it impossible to run a cable. Unless you understand the construction details of your home, you don’t have much of a chance of running cables correctly.

One way to detect how the carpenter put your home together without tearing out all of the walls is to use a stud finder. Stud finders rely on a number of technologies; one of the most common is to send sound waves through the wall. You won't hear the sounds—they’re outside the human hearing range. However, the stud finder will provide an indication of a stud based on the char-

acteristics of the sounds it receives back from the wall. Some stud finders also rely on magnetic or other techniques to locate studs. For example, a common technique explained on the Howstuffworks Web site (http://home.howstuffworks.com/question271.htm) relies on changing

capacitance. The important issue is that you can map out the wall you want to use for running a cable using this technique and be sure that you won't run into any solid obstacles such as a firebrick. Unfortunately, a stud finder won't help you locate nonsolid sources of interference such as insulation. 138

$a

nstalling the Hardware

Carpenters, electricians, and other trades all have their own jargon. You need to know at least some of this jargon to ask good questions and make your needs known. A good place to discover more about jargon associated with the housing trade as a whole is the Home Building Manual Web site at www.homebuildingmanual.com/Glossary.htm. Another good place to look is contractorslicense.com at www.contractorslicense.com/0-24-glossary.htm.

It's essential to use the correct kind of wiring for your security system. Using the wrong cabling can result in several problems. The immediate problems include failure of the security system to work at all and rejection of the security system by inspectors. Long-term problems can include reduced security system effectiveness and even fire if the overstressed cable gets too

hot. Table 5-1 shows the various cable types and describes their purpose. Make sure you have enough of each cable type on hand before you begin wiring your project. This table contains the common cable types; check your local building code to be sure you don’t need any special

cables to meet local code requirements.

Some types of cable require special tools to ensure a perfect installation. It’s possible to obtain a good installation without the tools in most cases, but youll find the task easier when you use the special tools. For example, category 5 cable can be difficult to work with using standard tools.

The CompGeeks Web site at www.compgeeks.com/details.asp?invtid=CT-CAT5E-1000-30U sells a reasonably priced kit for making category 5 connections and testing them afterward.

Coaxial cables of all types also require specialized tools to get the best results. The RG-6 cable used for cameras and video distribution has several layers of wire and insulator that you need to cut correctly. In addition, this cable relies on special connectors that are hard to install without

the proper tools. You can find a list of coaxial tools and connectors on the HomeTech Solutions Web site at www.hometech.com/tools/coax.html.

To ensure that you have a reliable telephone connection, in most cases you should connect the security system to an RJ31X device. The Home Tech Solutions article at www.hometech.com/ learn/rj31x.html provides information on wiring the RJ31X jack. One issue that you need to consider is precisely where the security system connects to the outside line. Make your security system the first device in the line. Otherwise, an intruder can simply take a telephone off the hook to block calls to the monitoring company. By making the security system the first device in line, 13?

Table 5-1. Wire Types Commonly Used for Security Systems ee

ee

ee

ee

Wire Size or Cable Type

Number of Conductors

22 AWG*

Two-conductor

copper wire

ee

ee

Purpose

Use this cable to connect two-wire sensors to the control panel. You can also use it to connect external contacts to transmitters. Generally, you'll use this cable for low-voltage and low-current applications.

22 AWG

Four-conductor copper wire

Use this cable to connect four-wire sensors to the control panel. You also use it to create the connection from the control panel to the telephone company interface so the monitoring company can monitor your security system. Normally, the telephone company connection is through an RJ31X device supplied with the security system. Generally, youll use this cable for low-voltage and low-current applications.

18 AWG

Two-conductor copper wire

Use this cable to create a connection between an external power supply and the control panel. You also use this cabie to make power connections between the power supply and any sensors that require power. Make sure you consider the length of run and local/state codes when making power connections. Long power runs may require that you use a larger cable to ensure the device receives enough power and the cable doesn’t heat due to resistance.

14 AWG

Single-conductor copper wire

Use a single, bare copper conductor to ground the security system. Failure to ground the security system properly can result in shock, along with other problems such as equipment damage.

Category 5 cable

N/A

Use category 5 cable to make connections between devices, such as security cameras, and the security system. In some cases, you'll also use a category 5 cable to make connections to the residential network. Some devices also rely on category 5 cable for low-voltage power connections. Check the device documentation to ensure you use category 5 cables as necessary.

Coaxial Series 6

N/A

Use RG-6 cable to create a connection between video cameras and the video distribution system. The video distribution system can include video monitors and VCRs used for taping the camera input.

N/A

Use FPLP cable when you want to install a centrally monitored fire alarm system that relies on cables that run

(RG-6) cable

Fire Power Limited

Plenum (FPLP] cable

through ducts [see section 760.61 in the NEC). Fire Power Limited (FPL) cable

Use FPL cable when you want to install a centrally monitored fire alarm system that relies on cables that run through walls or other general areas (see section 760.41 in the NEC).

ee *AWG = American Wire Gauge

140

ee

you ensure that it can seize the telephone line as needed to ensure that the telephone call will go through.

ADDING PHYSICAL SECURITY

Normally, you'll want to wait to install new physical security until after you run cables and install the security devices. It’s possible to place the physical security in a position that impedes installation or proper functioning of the other security measures you provide. Of course, there isn’t any hard rule that states you must install physical security in any set order. If you live in an area with a high crime rate, it might actually be beneficial to install the physical security first. However,

perform the installation with the requirements of the other security devices in mind. The remainder of this section describes additional physical security elements that you should consider. Creating good physical security means looking for flaws in the connection between the security

device and the house. Adding bars to the windows on your house helps, but only when the connection between the bars and the house is solid. Using anchors to secure the bars to the house

only works if the intruder can’t extract the anchors easily. It’s usually better to secure the bars to a framing member using a minimum of three-inch screws or lag bolts. Make sure you use screws or bolts that include a sheared section that makes them nonremovable (also called one-way secu-

rity screws)—you don’t want the intruder simply unbolting the window bars. Some installers actually weld the lag bolts to the window bars after completing the installation.

When installing doors and windows, be sure you shim them properly. The shims appear at intervals around the door or window and fill the gap with the framing. A lack of shims can make it easier to kick a door in or spread a window frame to remove the window. If you're installing new windows,

consider using casement windows in place of the older double-hung or Pearson windows. Generally, casement windows are more secure and retain heat better than older styles. Sliding windows are also a good choice, but you should provide blocking to limit how far the window can be opened.

Doors require special attention as well. Use a minimum of three-inch screws for all door ele-

ments. Make sure the screws go entirely through the facing into the door framing. Always use a solid steel strike at least ten inches long for dead bolts. The strike is the part of the assembly that mounts to the doorframe. The bolt passes through the strike into the doorframe. Use three-inch

screws for the strike as well. Using long screws that attach the door directly to the wood framing members of the house reduces the chance that someone can kick in the door. 141

Chapter 5

Be sure to secure all areas of the home, including crawl spaces, drop ceilings, and attics. Consider the robbery of the fast food restaurant where a thief hid in the drop ceiling in the men’s room until the staff had left. Once the thief had the store to himself, he robbed the store by rolling the safe out the door. This event taught the fast food restaurant to check the drop ceilings and to take the wheels off the safe. Access through roofs or dropped ceilings is actually quite common. Shows such as America’s Most Wanted [www.amw.com] often highlight the odd ways that intruders can gain access to your home. These stories can prove helpful as a means of creating your own checks for physical access to your home.

Someone can still jimmy a door with a horizontal dead bolt. The job is a lot harder with a long-

throw dead bolt, but it can conceivably be done. You can combat this problem by installing one or two vertical dead bolts. A vertical dead bolt locks directly into a ring that you drill into a framing member, making it impossible to jimmy the door with any expectation of success.

SECURING WIRELESS AND HARDWiRED SYSTEMS Anytime you use RF transmissions, it’s akin to screaming in public—everyone can hear you. With

the right tools, someone can scope out your security system by grabbing the signals it transmits and interpreting them. Consequently, you need to make it more difficult for the intruder to dis-

cover anything about your security system, or you might find certain elements compromised before the intruder even gets to test them. Most wireless security systems provide some form of data encryption and other forms of wireless

protection. The problem is that the vendor hasn’t turned the security on in many cases because you have to provide a password or other means of identification to the system. A default pass-

word is about as useful as no password at all; anyone who purchases the system will know the password. If your security system permits it, use a different password from the one used to enter the house, and don’t give it out to anyone—no one but you needs to know this password since the system only uses it to secure wireless communication. An exception to the security rule is the X10 network. This network doesn’t include any security beyond the security that a device provides. Consequently, an intruder who knows you have an 142

Passphrases are the new replacement for passwords. Instead of relying ona single word, such as “MASTER,” to provide protection for your system, you use a phrase, such as “This is my 3rd password.” A passphrase isn’t easy to overcome using many of the standard attacks such as dictionary attacks, yet it’s very easy to remember. A passphrase uses all of the recommended

features for strong security including a mix of uppercase and lowercase letters, numbers, and special characters. A passphrase is easier to remember than other solutions that people have tried such as JK34&l1123zl. All current versions of Windows, including Windows 9X,

Windows NT, Windows 2000, Windows XP, and Windows 2003 support passphrases.

X10 system installed could simply plug a maxi-controller into an exterior outlet and override your wired security system. Overriding a wireless X10 setup is even easier—the intruder doesn’t even need to make a physical connection to the system. While a lack of security is an X10 system flaw,

don’t assume that other wireless systems provide absolute security. Most wireless systems have flaws, some publicized and others not. A determined intruder can override any wireless system given enough time and a good enough reason; all that the other systems do is discourage the

intruder and buy time for you to discover the problem. Even though X10 systems don’t provide wireless security, don’t discount them as a potential solu-

tion. At minimum, an X10 system provides a basic level of security and can provide a deterrent (sirens, lights). X10 systems can call the homeowner or rely on third-party monitoring. Think

about X10 systems as a budget solution that is adequate for some homes. An intruder would need to know you have an X10 security system in place in order to target your home in this manner. The savvy consumer needs to decide if the level of security an X10 system provides is adequate. In a neighborhood with a strong community and stay-at-home moms, and in a household of mod-

erate means, an X10 system may provide everything needed. In a security-aware environment,

someone hanging around a house looking suspicious while playing with a Pocket PC may be enough to cause some concern.

You saw in previous chapters that many security solutions, especially cameras and other setups that provide remote signaling, rely on a PC ora device that uses PC technology for processing power. When working with a PC to provide part of the security hardware, make sure you understand both wired equivalent privacy (WEP) and Wi-Fi protected access (WPA). The Institute of

Electrical and Electronics Engineers supports both standards for protecting PC-based wireless 143

Chapter 5

communication. Of the two, WPA is the newest standard; you can read about it on the Wi-Fi Alliance Web site at www.wifialliance.org/opensection/protected_access.asp.

Consider reading two Microsoft articles for working with WPA as well. You can find the article

entitled “WPA Wireless Security for Home Networks” at www.microsoft.com/vindowsxp/using/ networking/expert/bowman_03july28.mspx and a second article, “How to Secure Your Wireless Home Network with Windows XP,” at www.microsoft.com/vindowsxp/using/networking/learn-

more/bowman_05february10.mspx. Both of these articles describe Windows XP features that make it easier to secure wireless communication, including setting the all-important WPA preshared key (PSK), which is the passphrase that Windows XP uses to secure wireless communications.

No matter what kind of network you use, make maximum use of the software configuration features it provides. Make sure you use unique passwords or passphrases and that you change them relatively often (at least twice a year). When it is available, use data encryption for all of the data that the network transmits. In addition, remember a basic principle: the best-kept secret is the

one that no one knows. Never show anyone your security system; if possible, don’t even mention it. The less someone knows about your security system, the better. Yes, external cameras, key-

pads, and sensors all act as deterrents, but they also don’t tell anyone about your particular security system.

CONSIDERING POWER REQUIREMENTS Security systems are low-power devices and normally don’t require any special connections or

anything of that nature. You won't start up the security system and suddenly find that your electrical bill increases tenfold. However, you'll find that many homes have the fire alarm on its own well-identified circuit. The reason for this seeming misuse of an entire circuit is that you don’t

want to turn off the security system, including your fire alarm, for any reason (except to work on the system, test it, or maintain it in some other way). Always place your security system, includ-

ing special sensors such as the fire alarm, on a separate circuit whenever possible. Make sure you identify this circuit in the circuit breaker box so that no one turns it off accidentally. Unless you are one of these fortunate homeowners with a dedicated circuit for either the fire alarm or an existing system, you need to consider adding a dedicated circuit. However, most peo-

ple don’t have the expertise required to open the circuit breaker box and add another circuit— 144

WoRrKING WITH ZIGBEE NETWORKS ZigBee networks are a new kind of home automation network that already includes a number of products. ZigBee is so exciting because it can greatly increase the battery life of your systems, while simultaneously giving you more flexibility and greater security. You can

find a great overview of ZigBee networks on the Home Security Information Web site at www. homesecurityinformation.com/zigbee-wireless-for-home-automation.htm. A number of other wireless solutions exist for home automation, but they're mostly pro-

prietary products. Before a home automation solution will take the world by storm, it has to

provide a common

platform for all vendors. The TechOnLine article at www.techonline.com/

community/tech_topic/bluetooth/36561explains why ZigBee is a good choice. This article is one of the few to advance an eventual price for ZigBee technology—as little as $3 per node. That isn't particularly cheap, but ZigBee won't cost as much as many other technologies on the market today and it may eventually become a commodity, driving prices lower.

ZigBee is an international standard. Theoretically, anything you discover about ZigBee in one country will translate well for other countries, too. In addition, you should be able to locate devices from all over the world that will work with your security or home automation system.

Consequently, prices for ZigBee devices will drop relatively fast. You can discover more about the standards and how they work together to produce a cohesive solution in the RTC magazine

article at www.rtcmagazine.com/home/article.php?id=100061. This article also discusses a number of specifics to help you understand how ZigBee can meet your home security needs.

You can find a detailed article on how ZigBee works and why it’s so much better than other networking protocols for home security in the two-part Circuit Cellar series in the

February 2005 (www.circuitcellar.com/library/print/0205/Cross175) and March 2005 (www.cir cuitcellar.com/library/print/0305/Cross176) issues. Conceivably, ZigBee can do everything needed for home security and perform tasks such as turning the lights on and off. ZigBee provides all the features of an X10 system and adds security and a little more flexibility (not to

mention greater bandwidth). The February 2005 issue of Circuit Cellar provides a relatively complete comparison of ZigBee to all of the other network protocols so you can determine whether ZigBee meets your needs with greater ease. Not much ZigBee hardware is available today, but that won't remain true for long. If you want to work with ZigBee, you can find an excellent, and growing series of links on the

Freescale Semiconductor Web site at www.freescale.com/webapp/sps/site/overview.jsp?

nodeld=02x.

145

Chapter 5

at least not safely. Contact an electrician to perform the task for you. Have the electrician run the new circuit to a conveniently located junction box to which you can run the power cables for the

various security system elements, such as the central controller.

The best time to contact the electrician is after you design the security system and have all of the

parts on site but before you begin installing anything. Adding the new circuit at this point means that the electrician can look at the devices you want to install if necessary to determine what size circuit to install. In addition, the electrician can advise you about potential problems in your plan

and help you find the best location for the junction box.

After you install and wire the central control panel, you'll want to verify that you can actually work with it—that the panel displays information when you turn the device on. If your central control panel includes a backup battery, charge the battery for at least twenty-four hours before

you connect any devices to the central control panel. The vendor instructions should provide additional information on battery charging.

CONFIGURING THE SOFTWARE

The final step to install your security system is to configure the software. Make sure you have everything installed before you begin this process. Read the manual before you even think about turning the system on. It’s relatively easy to set your system up incorrectly when you don’t understand how the central control panel works. Vendors try to provide great input for new users, but

the assumption is that you'll read the manual before you do anything. When in doubt, try to get the vendor to demonstrate the setup process for you or ask if there’s a simulator available to try configuration steps before you perform this task on the real device. When a vendor doesn’t provide this support directly, you can sometimes find the required support on a third-party vendor's Web site. During software configuration, you program the central control panel to recognize the sensors

attached to your security system, add users, and create passwords. The complexity of the process depends on the features that your security panel supports. A simple security panel configuration without many features can require just a few seconds to complete. The hardware recognition and configuration process can become a little frustrating if you don’t know how your system works. In some cases, a loose wire can cause recognition problems. The sensor appears to work, but the connection resistance is such that the central control panel 146

stallingthe Hardware The components within the central control panel can make a big difference in how difficult the device

is to work with.

For example,

when

the central control panel

includes electrically erasable programmable read-only memory (EEPROM}, it will retain the settings you provide even if a power failure occurs. The EEPROM provides reliable permanent memory. Unfortunately, not every central control panel includes this feature; some rely on a battery backup to keep the settings in memory. However, if the power remains off long enough to exhaust the battery, you'll still need to reconfigure the system.

doesn’t recognize the device. If this problem occurs, try reconnecting the device and tightening any loose connections. In some cases, you might have to clear the security panel and begin the hardware recognition process from scratch. You also want to ensure that none of the leads is so long that it shorts against the back of the panel or other leads. Keep the leads short and the insulation in place. Finally, make sure that you ground everything properly. A bad ground can cause the system to work intermittently or not at all. Working with wireless devices can present a special problem during the hardware recognition process. Make sure that the device hasn’t experienced interference of some sort. In addition,

ensure that the device is within range of the receiver and that you have it turned on. Try moy-

ing the wireless device to another area if you continue experiencing problems. Using an area with a similar device that the central control panel does recognize is always helpful. Again,

remember to clear old entries from the control panel to improve the chances of success after a change.

Most central control panels have multiple operational modes. Make sure that the device is in the correct mode if you experience problems configuring the central control panel. The biggest clue is that you won't be able to access specific central control panel features or that the device will refuse to recognize any of the hardware devices. Whenever there’s a major configuration failure, look at the central control panel and its environment, rather than a specific device.

Multiple keypads can also become a problem during the initial configuration. Some central control panels support up to four keypads, each of which could be a different type or have differing

ancillary devices attached. The simple addition of an electronic voice annunciator (the component that lets the alarm system speak) can cause configuration problems. Try connecting just a 147

Chapter 5

single keypad to perform the initial configuration, and then add features afterward if you experience problems. Follow vendor instructions for configuring the additional keypads. A keypad might require a jumper change to let it interact with the central control panel. In addition, make sure you check the simple things—a nonfunctioning keypad could simply require a change in contrast to let you see the display.

After you configure the central control panel basics, you might also need to consider special items. A central control panel that includes panic buttons will likely require that you provide a telephone number for each of these buttons. You might also need to provide a telephone number for your pager or cellular telephone to receive alarm information from the central control panel. Make sure you configure any delays that the central control panel provides. For example, the delay between the time you enter your house and the time you turn off the alarm is very important. If you set this number too low, you can experience false alarms, while setting the num-

ber too high means an intruder will gain extra time in your home before the security system calls the police.

Always verify the time when working with your security system configuration. An incorrect time setting can cause a number of problems. Setting the device to PM when it’s really AM will cause problems as well. Because you're focusing on a “big” problem, it’s easy to miss these little prob-

lems when you configure the system the first time. You'll want to recheck the time if you experience problems after the initial installation too.

LeT’s START SECURING This chapter has presented an overview of everything you need to do to install an alarm system. You'll still want to read the vendor documentation and be sure that you understand the finer

points of your particular system. The biggest mistake you can make at this point is to open the box and start connecting parts without reading the manuals first. Often, the manuals provide

added instructions for performing tasks that aren’t obvious when you look at the part or work with the software. Make sure you take the advice of several sections of the chapter and check the

vendor.Web site for updates as well. Most vendors won't tell you that these updates exist—they simply assume that you know.

Successfully completing the steps in this chapter means that you have an alarm system. Congratulations! Of course, it’s an untested alarm system, but at least everything is in place and 148

Installing the Hardware

you're reasonably sure everything will work as anticipated. This is the most exciting chapter of the book because you finally get to see the results of your hard work in planning the system. The lights blink, the software reports, the alarm sounds—everything is as you planned.

Chapter 6 is the peace-of-mind chapter. Having an alarm system has a certain appeal, but you don’t really know that the system is fully functional and that it will work as you think it will. Using the testing techniques in chapter 6 will give you the peace of mind of knowing that the system really does work. When you complete chapter 6, you'll know that you can leave your home and be certain that no one can enter without detection. Depending on the accessories you install,

youll also have a good idea that fire won't take everything you own, that your house won't be flooded, and that the freezer will continue to keep your food safe. By the end of chapter 6, youll

know that all of these safety features are tested and that they work.

149

ie

>

asi Cob ela a3 *y

_

"

TESTING THE SETUP i

——— _ __ —TBF8—=£

fter installation, you have a shiny new security system, but you don’t actually know whether gp™ the system works and you do know that you haven't adjusted the system for optimal performance. That’s where the first testing phase comes into play. You always test a security system after installing it to ensure everything works. In addition, you verify that you have everything adjusted so that elements such as the cameras can actually see an intruder. However, testing isn’t a one-time process. The second phase of testing is ongoing. You test the

system as part of maintenance to ensure that it continues to work as anticipated. Without this level of testing, system performance can degrade and you'd never know about it. Maintenance testing also helps you remain familiar with your security system. You use parts of the security system that you don’t work with every day and explore areas that you might not have seen since the original installation. A third testing phase occurs when you know something isn’t working correctly, but you aren’t

quite sure where the problem resides. Diagnostic testing is an important part of the test cycle because it helps you locate faulty security system components and understand why they failed. In some cases, the testing will point out corrective measures you need to take to prevent the problem from occurring again. The three testing scenarios occur during specific times and include specific kinds of tests. You 151

Chapter 6

z

must decide what to test, how to test it, and when to perform the test. It’s important to schedule the tests and keep on track running them. Otherwise, you're just fooling yourself into thinking that the security you worked so hard to set up will actually help you when needed. The follow-

ing sections describe the kinds of testing and explore the best times to perform the testing. You'll also discover when you need to hire someone to help you with the testing, rather than perform the task yourself.

VALIDATING THE SYSTEM Validating, the act of establishing the soundness of your security system, is one of the most important tasks you can perform. Simply installing the security system, configuring it, and test-

ing a few of the other buttons really isn’t enough to validate your security system. Without validation, you can’t have confidence in the security system, and you're left without the peace of mind that’s supposed to be one of the main features that a security system provides beyond mere protection. Consequently, you must consider a testing scenario—a plan for validating your sys-

tem—and determine precisely what you want to test. The following sections examine these issues in detail. Good, Better, and Best Testing Scenarios

You don’t want to spend your entire life testing your security system—no one wants to become a slave of the technology that’s supposed to provide freedom from worry. You do need to test it sometime, or you won't know that it’s working at all. The answer is to create a security plan (a writ-

ten document that describes the scenario) and use it to determine not only what you want to test but also when to test it. The goal is to create a testing scenario—one that you can use every time you test the system. After working through the testing scenario a few times, you'll find that the testing process becomes much faster. You eventually won’t spend much time at all working through it unless there really is a problem.

A good testing scenario defines the interval for testing the equipment and precisely which equipment you want to test. You'll want to test essential devices at the lowest level as a minimum. In fact, you can consider this documentation the minimum for any security system. The interval you use determines the confidence level of the system. The minimum interval that most experts recommend is six months, or twice a year. In fact, many television stations now run public service 152

announcements reminding people to replace the batteries in their smoke detectors twice a year after testing the device. Those announcements are also your cue to test the entire security system. The good testing scenario also tests all of the easily accessible security features. For example, you want to test all of the door and window sensors; they're very easy to check. In addition, you'll want to check every smoke detector because it’s an incredibly important safety device. Make sure you check out the central control panel as well, using each keypad you've attached to it in turn. Finally, verify that you've focused, cleaned, and pointed your cameras (if you have them) in the right direction. Have someone stand where you expect to see an intruder, and verify that you see the correct image. Verify the limits of the camera as well; have the person move around so you can make sure you don’t have any unanticipated blind spots.

A better testing scenario includes checking some of the devices that aren’t necessarily easy to reach or test. You might want to go to the expense of performing a detailed test on your smoke detector (see “Testing Smoke Detectors” later in this chapter). In some cases, you might need to take the device somewhere to have it tested. For example, you can’t fully test a carbon monoxide or-radon detector without special equipment. However, you can remove the device and have it tested as needed. You'll also test some of the more unusual devices such as glass break detectors and flood detectors. These devices normally work as advertised, but you can’t assume any-

thing unless you actually test them. The better testing scenario also includes quarterly, rather than semiannual, testing, as a minimum.

The best testing scenario not only verifies the operation of each device but also checks it for other potential problems. You visually verify the status of each device, which might mean spending

time crawling around less accessible areas of the house. For example, you'll want to make sure that no one has tampered with your cameras and verify that there aren’t any rodents enjoying the cabling you spent so much time installing. Even though the device is working today, these additional checks verify that it will also work tomorrow. The best testing scenario also tries to eliminate the human factor in testing by checking the system on different days of the week and under varying conditions. You can’t guarantee that an emergency will always happen on Tuesday, so scheduling every test on Tuesday doesn’t make sense if you want the ultimate level of security. At this level, you also test your system more often—likely once a month. No

one says that you have to follow one of these scenarios strictly. You might test every device

once a year and only the important devices quarterly. The important issue is to test your system regularly—on a strict schedule. When you think about it, checking the security system in your 153

Chapter 6

NLL

Deputy Mark Mueller has been with the Milwaukee County Sheriff's Department for three years and worked in the

Milwaukee County House of Corrections for ten and a half years. He works with criminals daily and has an understanding of the

criminal point of view.

Q. What are the personal safety benefits of getting a home security system installed? A.

The personal safety benefits can provide a sense of security in the home for some people. It depends on the person. Personal security can mean different things to different people.

For some people it means having a baseball bat next to the bed or a handgun they can use.

Security systems are simply another means of providing peace of mind for the individual. Q. A.

Do home security systems work well for people who live in remote or secluded areas? Keep the features that your security system and monitoring company provide in mind.

When the monitoring company relies on local police to answer the call, response times may increase. A monitoring company that provides its own security force is often better in

remote or secluded locations because you can get a better response time and it’s more likely that the intruder will get caught. In addition, some local police departments now charge a service charge for responding to false alarms. Even if you don't receive a bill for the service, the monitoring company may receive the bill, increasing the cost of the services you receive. Q.

Are home security systems essential in high-crime areas?

A.

They arent essential. It depends on what you have in your house as valuables. You need to ask whether the contents of your house are worth the cost of the system. You also need to ask whether the alarm system will attract unwanted attention.

Inmates will often fix up the inside of their home, but leave the outside in a state of disrepair. Fixing up the outside of the home is like sticking up a sign saying, Come and rob me.” Installing a security system can also raise a red flag in such areas because

154

it indicates

there's something worth stealing in the home. Likewise, people will often move new appliances into the home at night so that neighbors can't see the new products. Q. How does the quality of the system affect the usefulness of the security provided?

A.

©

Some of the security systems coming out are so inexpensive that they cause many false alarms. For example, something as simple as wind can set them off, or ae

walking

around the outside of the house.

Q.

A.

Do you know of any security systems that work especially well, such as combined motion sensors and closed-circuit television (CCTV)? CCTV only works as well as the person monitoring it. It also depends on blind spots. When you're monitoring part of the room, something could be going on in another part of

the room and you wouldn't ever see it because your attention is focused on that one

camera. Q.

_

_

Do you know of any security systems that don't work at all? What about placing a security company sign on your property even if you don’t have the security system mieten. or

using fake security cameras? A.

These security system elements work as a| deterrent. For the most part, you're not dealing

with people that are overly intelligent, so they work well as a deterrent. Q.

Do you feel that home security solutions should also include personal assistance? (For

A.

example, someone falls and uses a call button to receive help?) Personally, | think that they're a good thing to have. The only thing that the homeowner

needs to be concerned about is how much access these call buttons provide to the security company. You'd be surprised at how many security guards end up getting arrested for committing the very crimes theyre supposed to prevent. Q. A.

Should you ever confront an intruder?

Leave the house as quickly as possible. Most homeowners that are killed during a robbery are killed with their own handgun, so a handgun isn't a good choice for security. Most of the people entering a home to rob it aren't interested in a physical confrontation. All they

Q.

want is your possessions. How would you rate the following home security goals and their importance from a law enforcement perspective?

First, determent {I want to scare an intruder away). A.

If you can use fake security cameras and other methods to scare the intruder away, that’s

the best way to go.

155

Chapter hi 6

pid

NU

Pc

a

ee

Se

eS

eee

Q.

Protection {I want to keep the burglar at bay using a combination of electronic and physical

A.

security}. \t’s important to have good locks on your house to keep the intruder out while you wait for a police response or, if you're not at home, keep them out of the house.

Q.

How about monitoring? {I want to know who's snooping around my home, even if they don't

enter it illegally.) A.

lf your monitoring system sends an alarm to you, so you can see someone breaking into

the house and record that information for the police, that provides great evidence for finding the intruder and makes it easier to get a conviction later.

Q.

Outside assistance (I want to have some means of contacting someone in an emergency, no matter what that emergency might be}.

A.

You should have a cellular telephone near your monitoring system. That way, if you see

someone breaking into your house, you can contact the police quickly. Q.

What about self-defense (| want to protect myself}?

A.

You should only use this option as a last resort when you or a family member is in danger

of great bodily harm.

house is just as important as any other maintenance task you perform. You wouldn’t drive your car with bald tires and without oil. Likewise, leaving your security system untested is just asking for trouble. Physical Connectivity

Physical connectivity is extremely important. Without it, your security system can’t interact with any hardwired devices, it can’t call the monitoring company to provide notification of an alarm, and it won't even work because you must have physical connectivity to supply power to the central control panel. In short, physical connectivity ensures that the system can (has the ability to)

work.

It's important to include several security system elements as part of physical connectivity. The most obvious element is the cable itself. However, you must also include the connectors that make the connection between the cable and the device (a connector can include solder joints or other permanent connection means). In addition, physical connectivity includes the cable sup156

Testing the Setup

port system, which includes conduit, staples, and supports. The failure of any of these elements can terminate connectivity between devices, reducing the ability of your system to perform a task

or even ending security system operations completely.

Fortunately, physical connectivity is one of the easier elements to test. Any device that can’t communicate—can't perform its required function—could have a physical connectivity problem. Generally, you begin by viewing either end of the connection because this is where most physical connectivity problems, such as a faulty connector or a solder joint that fails to hold, occur.

Sometimes, someone has simply unplugged the device accidentally. For example, it’s possible that someone could disconnect a window or door sensor while vacuuming the room or performing other cleaning tasks. The reason for the disconnection doesn’t matter—the fact that it occurs is all that’s important. After you test the connections, you can check the setup by performing a visual inspection. Check

the cable for cuts, abrasions, crimping, or other damage. Make sure that none of the support sys-

tem elements have failed or have damaged the cable in some way (improperly installed support

system elements often cause hidden cable failure; the damage appears under the support system element). Test the physical elements by carefully moving the cable and viewing the area sur-

rounding the support elements. The point of the visual inspection is to locate obvious cable problems without incurring high testing costs. Make sure you check for issues such as staple nails penetrating the cable and loose supports that have stressed the cable in some way.

Sometimes you can't locate a physical connectivity problem by testing the connection to the device or by visual inspection. In this case, you need to perform a cable test using any of a number of techniques. All of these tests require that you turn all system power off; having the system powered could damage instruments used to detect the problem. The good, easiest, and least expensive test solution is to use a resistance check to verify the con-

tinuity of the cable. Short the leads at one end of the cable and apply the ohmmeter to the leads at the other end of the cable—you should read a small resistance. The ohmmeter test won't find some cable problems, but at least it tells you whether the cable has a complete connection. In most cases, you don’t even need a full-fledged ohmmeter. A continuity tester, such as the one Web site at www.westmarine.com/webapp/wes/stores/servlet/ ProductDisplay?productId=7882, costs less that $10. You'll find a continuity tester tutorial on the on

shown

the West

Marine

at www.bobvila.com/FixItClub/Task/Repairing/FIG_Using page ContinuityTester.html. The Web page at www.kpsec.freeuk.com/projects/simplet.htm shows how Fix

It

Club

Web

157

It's tempting to check just one device before you perform an installation, but approach can lead to problems. Check every device before you install it. Verify every device is the correct type and includes the features that your security system requires. A ure to perform this check can result in a security system that doesn’t work properly even when

this that failyou

carry out every other part of the process correctly.

to build a simple continuity tester out of spare parts. Make sure you consider adding a tone-generator kit to your toolbox if you have a complex security system. It operates on the same princi-

ple as a continuity tester but provides features that make working with the product both easier and faster. The Extech Instruments Web site at www.extech.com/instrument/categories/cable/ cable.html shows several typical tone generator setups.

A better or best solution is to employ a cable tester (time domain reflectometer [TDR] or other technology) to check the cable without relying purely on resistance. This second check can locate

physical connectivity problems that a visual inspection or ohmmeter check might miss. For example, this test can help you locate internal stress breaks that might not appear on the outside of the

cable. You can also use a cable tester to check for problems such as water in the cable. Most TDR

cable testers cost a lot more than a continuity tester, starting at around $200 for a simple device. You can see an example of a TDR cable tester that includes a continuity tester and tone generator on the Triangle Cables Web site at www.trianglecables.com/256003.html. Some companies, such as Test

Equipment

1503C.htm)

Depot

and Test

(www.testequipmentdepot.com/usedequipment/tektronix/tdrs/1502C Equipment

Connection

(www.used-line.com/b2001p1pr0-used-cable-

tester.htm), offer TDR cable testers at a reduced cost. The Granite Island Group Web site at

www.tscm.com/ripreop.html contains a number of tutorials on working with TDRs. Look at the bottom of the Web page and you'll see a list of links for working with specific cable types. Hardware Setup Hardware setup testing consists of two phases. First, you must determine that the device will

work as anticipated. Often this means connecting the device to the system and verifying that it will work during normal operation. In some cases, you can also perform checks with the device disconnected from the system. Second, you must determine whether the hardware will work

with your particular security setup. The fact that a device works doesn’t always ensure success. 158

For example, connecting a normally open window sensor to a normally closed system won't work, even if the device is operating correctly. You need to match system elements carefully. However, a mismarked package at the store could mean you end up with the wrong device. You need to know the difference between a device that will work with your system and one that won't.

You perform the first phase of the testing using the vendor instructions. In fact, you'll perform this first-phase testing more than one time. It’s important to test the device regularly to ensure it still works as anticipated, so this is part of your monthly, quarterly, or semiannual testing. If the vendor doesn’t provide testing instructions or you want to verify those instructions to ensure

they're complete, check the “Conducting Physical System Checks” section of this chapter. For example, most smoke detectors tell you to press the Test button, but this test isn’t complete. The

“Testing Smoke Detectors” section of the chapter provides complete instructions.

The second phase of testing occurs prior to installation. Check the actual device for markings that verify its purpose. Look for part numbers you can use to validate the device to ensure it’s the right type. Match any specifications provided as part of the device or accompanying documentation to your security system. If you have doubts about the device, call the product vendor. Don’t rely on personnel at the store where you purchased the device to provide correct information; they might not be security professionals and could provide incorrect or misleading information.

Software Setup

Every security solution relies on software to perform the tasks that you request. The software is a series of instructions to the device that tell it what to do. Even though you can’t change the software directly, you can configure it to perform specific tasks in a certain way. For example, you

can tell the software to wait for thirty seconds before sounding an alarm when you open a specific door. The time delay provides time for you to enter the password into the security system and turn off the alarm when entering the house. Consequently, the time delay is an important part of the software setup. Setting this value too high will give the intruder time to disable the alarm without really knowing anything about the security system. On the other hand, if you set this value too low, the security system will generate false alarms that aren't due to any design problem with the security system itself—the issue is one of incorrect configuration.

Some people who are setting up their own security systems will provide a good guess for the 19

Chapter 6

security system settings. In fact, they'll err on the side of generating fewer false alarms, which increases the chances of an intruder circumventing the alarm. The only way to make the settings correct is to test them in actual use. However, because people are involved in the testing, it is

quite difficult to come up with a single correct answer to any given question. For example, you might wonder how much of a delay to provide or whether using an external keypad with a zero delay is a better solution.

Before you create settings for your software, make sure all members of your household know how to use the security system, at least to the level that they need to know about. Don’t just show family members once; let them run through their tasks several times until they become proficient. When you feel they have reached their peak proficiency, time each task. Use the maximum time as a basis for setting the security system values, and provide exercises to work on improving the task times. The less time you give the intruder, the better. Task times will change (generally improve) as household members work with the system. Review

the task times regularly (annually is best) to reevaluate the time required to perform each task.

Change the software settings as needed to accommodate changes in task times. Make sure you also change the settings as the members of your household change. Always consider the human factor when testing your security system installation from a software perspective. It’s also important to test your assumptions in other areas. Some security systems provide a num-

ber of automation features (see chapter 7). It’s important to test the automation. Don’t assume

that simply because the security system vendor tells you that an automation feature will perform a certain task, the feature works. For example, a security system might tell you that it can perform

an automated test once a month, but the fine print tells you that you need a special module to obtain this level of automation. It’s easy to miss fine print in any literature. However, if you actu-

ally look at the security panel when the system is supposed to run the test and see that nothing is happening, you know that something is wrong and can investigate the problem. Testing is important, even for automation.

You may also have to test the assumptions you make about the security system itself. For example, a security system might include features that adjust how the system works on the basis of

sunrise and sunset. You might want to arm automatic lights to go on at night but not on a cloudy day. The assumptions you make during summer months won’t work during the winter. Likewise, the winter settings aren’t very useful during the summer months. It’s important to constantly test

the assumptions you make about the security system and adjust the settings as needed. 160

rr

SHINY the SEtUP

Personal Settings

The personal settings you create for the security system don’t necessarily require testing, but they do require change. For example, you don’t want to use the same password for everyone in the house; make sure everyone has a personal password if your security system supports this feature. Using a different password for everyone makes it possible to check the security logs and see who entered the house and at what time. Monitoring the logs can help you detect problems such as compromised passwords or a teenager who is getting home too late. However, using different passwords has a practical application as well: it helps ensure that you won’t develop wear patterns on the keypad that an intruder could use to guess your password. No matter how your security system manages passwords, you need to change the password regularly (at least twice a year). Changing the password makes it less likely that someone will have

access to your house for long, even if a household member compromises the password. Using different passwords also reduces wear-pattern problems on the keypad. A different password can force family members to think about the security system again; the security system can become an almost subliminal experience otherwise, which is a dangerous state of affairs. The test, in this case,is seeing family member reactions to the password change. Therefore, the test is on the human, not the security, system.

Make sure you test the system to ensure that any changes you make actually affect it. For example, when you enter a new password, test that password to be sure it works as anticipated. Verify

that the old password no longer works by entering it using the keypad. This two-phase test is important to ensure that the security system understands the changes you think you made. You'll also want to remove, and test the removal of, passwords when the structure of your household

changes. Don’t wait a day or two—make the change immediately. Demonstrate that the password no longer works so the person who has left the household won't try to use it (possibly generating a false alarm).

PERFORMING A PREPLANNED SECURITY TEST

Set test dates for your security system and don’t let anything disrupt them. A good way to conduct security tests is to choose the same day for monthly, quarterly, or semiannual testing. Choosing the same day makes it less likely that you'll forget to perform the task.

A better way to test the security system is to use the same day for each test but to alternate 161

Chapter 6

between daytime and nighttime testing. Using this approach still ensures that you'll run the test but also reduces the risk of obtaining biased results. The use of daytime and nighttime testing

can help you check that your assumptions about the security system are correct as well as verify that the monitoring company staff provides equal coverage during the day and night. The best way to perform security system testing, however, is to mix days—to choose some daytime and nighttime testing, along with weekday and weekend testing. A mixed setup makes it easier to

forget to perform the test, but it ensures that you test the system under a variety of conditions. The following sections describe daytime, nighttime, and weekend testing requirements.

No matter what level of testing you use, you need to complete a few tasks before you do it. The following list provides suggestions on tasks that you should always carry out. Your locality might require that you perform other tasks as well, so make sure you check local regulations. ¢ Notify the monitoring company. If possible, have the monitoring company work with you through the test so that you can judge the company’s performance. ¢ Notify the police and fire department. You don’t want anyone responding to a false alarm.

¢ Notify your neighbors. It’s important that neighbors know that this is a test so they don’t call the police or fire department and generate a false alarm. e Place your security system in the recommended test configuration before you begin the test. Make sure to return the security system to an operational state when you complete

the test. ¢ Have everyone in your household participate in the test. Your security system is only as strong as its weakest link, which is usually the human operating it. Daytime Testing

Daytime weekday testing is by far the easiest because the security vendor and monitoring company both have full-time regular staff on duty. The support staff for any security equipment you own is also available. In addition, you can see every aspect of your security system, making it easy to take equipment offline, visually inspect it, and ensure you test everything fully.

You might be tempted to think that daytime testing is the perfect solution. However, it also has a number of disadvantages: ¢ Inconvenience. The most important disadvantage is that it’s inconvenient. If you work on

weekdays, it's hard to justify taking time off to test your security system. 162

te

et

Testing the Setup

° Overly optimistic results. Testing your security system during a weekday can give you a false sense of security. The monitoring company is likely to place its highest-qualified personnel on the day shift, which means you're more likely to see perfect results during weekday testing than at any other time. You don’t necessarily want to know that the company can produce perfect results; you want to know about the worst-case scenario response. ¢ Inaccurate family response. Daytime testing on a weekday finds your family at the peak of its performance. Your family will respond at its best during a daytime test. You don’t know how your family will respond in the middle of the night when sleepy eyes and muddled thinking will produce less than stellar results. After you run a few of these tests, you tend to think that your family is prepared for anything, when in reality, they most likely won't respond very well at all to a nighttime event. In some respects, this sense of false

invulnerability is worse than seeing a bad nighttime response and working through the problems it reveals. ¢ Unpredictable equipment status. Your security system could act differently at night than . it does during the day. For example, the environment is different during the day than it is at night. Moisture levels can increase at night, causing moisture-related electronics

_ problems. The absence of daylight can also cause the equipment to behave differently.

Consequently, when you test your equipment only during the daylight hours, you don’t know your equipment will really react under all conditions. Nighttime Testing

Adding nighttime testing to your repertoire increases the chance that you'll locate and fix any deficiencies in the security system before they cause problems. When performing nighttime testing, check out the equipment as well as procedures you set up in your house. As soon as the alarm goes off, make sure everyone performs whatever task you assign for that particular emergency. Test the system with sleepy children to be sure they truly understand what they're supposed to do in an emergency—it’s too late to emphasize procedures when the emergency actually occurs. The biggest advantage of nighttime testing is that you can determine how your security system works when you need it most. After all, nighttime is when you are least likely to learn about a fire

or intruder until it’s too late—when your personal safety is in jeopardy. You need to exercise caution when performing nighttime testing. In addition, nighttime testing brings with it some significant problems. The following list contains some items you need to consider. 163

Chapter 6

° Considerate behavior. Your neighbors are unlikely to appreciate a 2:00 a.m. test of your security system. Although you can’t guarantee that an alarm will occur when it’s convenient (in fact, it will probably occur at an inconvenient moment), you need to show con-

sideration for your neighbors by holding the nighttime test at a reasonable hour, probably no later than 10:00 p.m. Ask your neighbors about a convenient time before you conduct the test. ¢ Inaccessible support. Don’t expect much support from your security vendor or monitoring company during a nighttime test when support personnel have already left for the

day. For this reason, make sure that you know everything possible about your security system before you begin the test. ¢ No monitoring company check. Check with your monitoring company before you make any assumptions, but it’s unlikely that you'll be able to test the monitoring company connection during a nighttime test. For this reason, you should never rely on nighttime test-

ing exclusively; always use it in combination with daytime testing so that you can test the monitoring company connection at least once a year.

Weekend Testing

Weekend testing is important because household conditions change on the weekend. For one thing, you're very likely off work during the weekend and the children are home from school. All

of the items that you stow away neatly during the weekday come out and the house is a little less organized. Everyone’s also relaxed after a hard workweek. Even though the security system is the same, you might disengage specific features to make movement easier. In short, the fact that your security system works well during the week is no indicator that it will work on the weekend. You'll find that weekend testing is both easier and harder than weekday testing for a number of

reasons. It’s easier because everyone is home. You can get the entire household involved with significantly less effort than during the week, when activities tend to make testing hard. Your neighbors are also easier to reach, making notification significantly easier.

Contrasted to all of the things that make weekend testing easier are outside elements that make it harder. Even if your security vendor and monitoring company provide weekday support in the

evenings, you'll find support completely lacking on the weekends. Monitoring companies like to give everyone the weekend off too, so you'll find that accessing the monitoring company for any-

thing other than an emergency during the weekend is impossible. For this reason, always maintain some level of weekday daytime testing to ensure the monitoring company connection works. 164

You might wonder why this book even includes anything about weekend testing if it’s likely to cause so many problems. The fact is that you're more likely to need the smoke detector and other safety alarms during the weekend than you do during the week. The alarms are there to protect you during the weekend hours when everyone in the household is home, relaxed, and probably not paying as much attention as they should. Do whatever you can to perform weekend testing so that you can be sure that the security system will meet your needs during this critical part of the week.

Some communities actually disallow weekend security system testing, so be sure to check with

your locality before you perform a test. The reason for the ban is that the local community doesn’t provide the same police and fire department staffing levels on the weekend that they do during the

week. Although the staffing level is sufficient to meet any emergency, it isn’t sufficient to deal with people testing their security systems.

CHECKING THE MONITORING SYSTEM Any good and reliable central control panel, key panel, and monitoring display combination will

provide several levels of testing. Any kind of system you own, even an unmonitored one, should

provide tests that ensure the central control panel is working as anticipated. Another, usually separate, test also verifies that the various sensors are in the correct state. Note that this test

doesn’t verify that the sensor works, just that it’s providing the correct status information. A

third test should verify the status of every battery-powered sensor and alert you to sensors with weak batteries. In fact, the best security systems provide constant battery monitoring, where the third test runs at predefined intervals.

Always begin any testing by notifying the police department, fire department, monitoring company, and your neighbors. Place the monitoring system in a test mode appropriate for the testing you want to perform. As part of your testing, make sure the monitoring system lets you change settings in every area. You should be able change passwords, zone settings, security features, tim-

ing, and other elements of the security system. To test each area, record the original setting, make a change, test the change, and change the setting back to its original value. 165

Chapter 6

Have someone set off the alarm. Make sure you can reset the alarm after it’s set off. Verify that the alarm source noted by the monitoring system reflects the actual source of the alarm. You don’t have to test each device to check the monitoring system, but you should check one device in each zone. It’s important to test every device regularly as part of a device check.

If your security system includes tamper monitors, place the central control panel in normal operating mode. Open the central control panel. An alarm should sound and identify the central control panel as the source of tampering. Make sure you test any other devices that include a tamper monitor using the same technique. Place the central control panel back into test mode. Open the central control panel. This time, the alarm shouldn’t sound because you're in a test mode. Note that some devices require that you place them in an engineer mode rather than a test mode. Even though the directions in this section work for most central control panels, always read the central control panel manual before performing any required testing. Otherwise, you risk causing irreparable damage to the panel.

Part of the central control panel testing should include verifying the device’s voltage levels. You

should only perform this test if you feel confident about your ability to work with live voltages. If you have any doubts, ask a qualified service person to perform the test instead. Make sure you

check the central control panel documentation for recommended voltage levels. The three voltage levels you should check are: e AUX voltage. The AUX voltage provides power to all of the hardwired detectors that use a DC voltage. Generally, this voltage is below 20 VDC. Place the black multimeter lead

on the negative AUX terminal and the red multimeter lead on the positive AUX termi-

nal. Don't use the central control panel case as a ground; always use the actual AUX negative terminal. Record the voltage as part of your permanent record. ¢ SAB voltage. The SAB voltage supplies power to the audible alarm (also called the bellbox hold off). To measure

this voltage, use the positive and negative hold terminals

within the central control panel. Record the voltage as part of your permanent record. * Battery voltages. The battery terminals measure the charging and discharging voltages for the battery. Make the first check with the battery connected to the system. Record

the voltage as part of your permanent record. Disconnect the battery and make a second check. Record the voltage as part of your permanent record. The second voltage check should be slightly higher than the first one. While you have the battery disconnected, check the battery installation date and replace the battery if it is five years old 166

Testing

theSetup

Central control panels and associated devices require testing by a national organization such as Underwriters Laboratory (UL] to ensure they're safe. In addition, the central control panel and many other security system devices must adhere to standards that ensure they meet certain criteria. Finding these standards can be difficult, so you don’t really know what the standards listed on a security system package mean. You can find good information about testing and standards for security systems on the Security Industry Alarm Coalition Web site at Wwww.siacinc.org.

or older. Clean the battery terminals if they show any sign of corrosion or replace the

terminals if they are badly corroded. Reinstall the battery. After you perform all of these tests, you know that your central control panel works fine in poweron mode. You should also conduct a power-off test as described in the “Conducting a Power-Off Test” section of this chapter. Make sure you place the system back into its normal operating mode after you close any open panel covers. Notify the police department, fire department, monitor-

ing company, and neighbors that you are finished testing the system. CONDUCTING PHYSICAL SYSTEM CHECKS Security equipment, like any electronic device, eventually wears out. The environment or other factors compromise

the device in some way. Constant use causes contacts to wear or stick

together. Rotting infrastructure, such as aging windows, can cause security components

to shift

and break down. Moisture and heat can lead to electronic component failure. For all of these reasons, and more, you need to perform physical checks on the devices within your security system. Otherwise, you can’t be sure that the devices will work when you need them. The follow-

ing sections describe testing procedures or options for various security devices. You'll also learn what to do with some devices that you can’t test very easily, if at all, within the home environment.

Testing Window and Door Sensors

You can test door and window sensors using two techniques, in-circuit and out-of-circuit. The incircuit test lets you check the device during monthly, quarterly, or semiannual testing. The in167

Chapter 6

circuit test is the one that you'll perform most often because you perform it after you install the device. You use the out-of-circuit test before you install a new device, either as part of an initial installation or as part of a sensor replacement.

The in-circuit test is the easiest and doesn’t require any special tools. Use the following procedure to perform an in-circuit test.

Perform any required notifications.

Place the central control panel into test mode. Open the door or window. Oe a eSWhen you hear the alarm, check the monitoring panel. Ensure the alarm system reports

the correct zone for the affected device.

Try to reset the alarm system—it shouldn't reset. Close the window or door. . Reset the alarm system—it should reset this time.

The out-of-circuit test requires a continuity checker or ohmmeter. Use the following procedure

to perform an out-of-circuit test. 1 Check for continuity across the sensor contacts with the magnet away from the window or door sensor.

a Place the magnet next to the sensor. The continuity state should change: if the continuity checker originally reported that the contacts were open, they should close when you

bring the magnet close to the device. Testing Motion Detectors Motion detectors are the easiest security device to check. Use the following procedure to perform to test any motion detector.

Notify anyone who needs to know that you're testing your system. Place the security system into its test mode.

Arm the motion detector. Move in front of the motion detector. The alarm should sound. ae BO 0” Rig Check the monitoring panel. Make sure that the alarm zone reflects the zone of the motion detector. Reset the alarm and shut the motion detector zone off. 168

Testing the Setup

If you have a motion detector designed to work with your children or pets, you should also test it with the child or pet. Perform this procedure in addition to the standard motion detector check.

1. Place the child or pet in the room with the motion detector and arm it.

2. Have the child or pet move around in the room. All you really need to do is provide a good reason for the child or pet to move—any movement at all is acceptable as long as the child or pet moves within range of the motion detector. The alarm shouldn’t sound. 3. Make sure you shut the motion detector off before you enter the room.

Testing Smoke Detectors Most people assume that testing a smoke detector means pressing the button on the front and hearing the audible alarm. Testing using this technique does check the audible alarm and the

basic alarm circuitry. It also verifies that the battery, if the device has one, is good.

Unfortunately, pressing the test button doesn’t check the smoke detector completely; you’ve missed three important pieces. The first piece is the sensor—you don’t know whether it will actually detect smoke. Smoke detector sensors do go bad and pressing the button doesn’t test this part of the smoke detector. The second piece is the connection to the central control panel—you don’t know whether the monitoring company will actually receive the alarm. The third piece is the connection to other fire alarms in your home. When you set up a fire alarm system properly, all of the alarms should sound when one alarm sounds. A better way to test your smoke detector is to obtain a can of Smoke Check (www.professionale-

quipment.com/xq/ASP/ProductID.172/id.185/qx/default.htm)

or

another

independently

approved substitute. The Underwriters Laboratory has tested Smoke Check as an effective means of simulating smoke for your smoke detector so that you can check it completely. Of course, using a real smoke source is both less expensive and less time-consuming. However, using

real smoke leaves a residue in the smoke detector, which decreases the smoke detector’s effec-

tiveness. The device could fail to work when you need it most. Using a product such as Smoke Check lets you test the device without degrading smoke detector performance. Use the following steps to test your smoke detector. 1. Place your alarm system into a test mode (one that monitors the fire alarm but doesn’t send

out a signal). If your alarm system doesn’t provide such a mode, call the monitoring company and/or fire department to let them know that you intend to perform a test. In fact, you 169

Chapter 6

It's generally a good idea to replace all of the batteries in your security devices twice a year, whether the battery seems good or not. Often, you can use these partially used batteries for other purposes—a radio, flashlight, or toy that isn’t quite as important as the security device. The batteries you replace need not go to waste; you simply use the remaining power for a different purpose.

should perform a test with the monitoring company at least once a year to ensure that the system works as expected (see “Performing a Preplanned Security Test” for details).

Ask someone to stand next to each smoke detector in your house. Ask someone who knows how to use the security system to view the panel to check the

smoke detector response. Ask someone to stay on the telephone with the monitoring company when necessary. Spray Smoke Check (or an equivalent) at the smoke detector.

Verify that the smoke detector alarm sounds. If it doesn’t, try spraying the Smoke Check again. If the alarm still doesn’t sound, then the smoke detector is faulty and you need

to replace it. Verify that the other smoke detectors in the house sounded their alarm. If not, you have

a loose connection between the test smoke detector and the smoke detector that didn’t sound. The second smoke detector could also be broken. Repair the broken connection using the suggestions in the “Diagnosing Potential Problems” section of chapter 8.

Verify that the alarm panel displayed the alarm. If it didn’t, you have a faulty connection between the central control panel and the smoke detector or the central control panel isn’t working correctly. Verify that the monitoring company received the alarm (when testing with a monitoring company).

10. Perform steps 2 through 9 for every smoke detector in the house. ide Place your alarm system into its normal operating mode. Call the monitoring company

and/or fire department, if necessary, to tell them that you've finished testing your alarm system.

Part of your smoke detector test is to ensure that you can react to the alarm when it sounds. Check every escape route from every room in the house. This might seem like a lot of work, but 170

a

Jesting theSetup

escape routes can clog with possessions, fail to work as anticipated, or simply become unavailable due to changes in the house. For example, you don’t really know that a window will open when you need it to unless you physically check it. When the fire alarm sounds for real, it’s too late to make this check. You have to know that the window will open so you can leave the house quickly.

If you really want to perform the maximum check for your smoke detector and verify that your house is as safe as possible, read the articles on the Society of Fire Protection Engineers Web site at www.pentoncmg.com/sfpe. Some articles are more interesting than others for the homeowner, but they all include useful tidbits of information. Testing Rise of Heat Detectors

Rise of heat detectors require a specific increase in heat to sound an alarm. A professional will likely perform this test using a heat gun and a thermometer to detect a specific temperature at which the device detects an unacceptable heat rise. Buying the special equipment might be out of reach for many homeowners, but you have access to a low-cost alternative—the blow-dryer.

Use the following procedure to test your rise of heat detector. -1. Perform all required notifications. 2. Set your home security system into a test mode.

3. Obtain a candy or candle thermometer and tape it to the heat rise detector. Make sure the bottom of the thermometer (the silvered part) is directly in the path of the blowdryer output. 4. Turn the blow-dryer on high and point it at the rise of heat sensor. 5. Watch the thermometer. When the temperature nears 135 degrees (or the rise of heat detector’s normal operating temperature), listen for an alarm. If the alarm doesn’t sound within 5 degrees of the specified limit, replace the sensor. 6. Perform any required after-test notification and reset your security system.

Testing Breaking Glass Sensors

Breaking glass sensors detect breaking glass using one of several methods. In general, you can’t test breaking glass sensors that use shock to detect breaking glass because these devices mount directly to the glass and rely on a physical disruption to sound an alarm. Testing the sensor destroys it in many cases. Consequently, you can’t be sure that these one-use sensors will actueS)

Chapter 6

ally sound an alarm. Theoretically, there isn’t any way that they can fail, but you don’t have certain knowledge that they are indeed functional.

Some vendors that sell breaking glass sensors that rely on shock tell you to test the device by rapping the window with a screwdriver or other instrument near the breaking glass sensor. These instruments are different from the direct-mount units. The Sentrol 5150 Glass Shock Sensor (www. 123securityproducts.com/sen51glassho.html) falls into this category. You can read about

this test procedure at www.smarthome.com/manuals/7356.pdf. The only problem with rapping the glass is that you could easily break it during the test. Audible breaking glass sensors are another story. You can test these devices easily using a number of techniques. When working with a less expensive glass break sensor, you can set it off by

clapping your hands next to the sensor. Better breaking glass sensors require a special test device supplied by the vendor. For example, the FG 701 Glassbreak Simulator found on the Bass Home Electronics

Web

site

www.basshome.com/product_4284_detailed.htm

works

with

all

Intellisense and ADEMCO breaking glass sensors. Testing Your Flashlights

It might not seem very important, but a flashlight can be a significant part of your security system. A little light can go a long way in letting you know what is going on in your house when an

emergency occurs. Flashlights can also mean the difference between getting out of the house

during a fire and being trapped.

Most experts agree that you should obtain one of the heavier rubber-bound waterproof flashlights such as the one shown at www.garritylites.com/site/retail_details.php?recid=98. Another good

choice

is the

weatherproof

flashlight

at www.garritylites.com/site/retail_details

-phpPrecid=65. The inclusion of a strap makes it easy to hang the flashlight within easy reach of

anyone who needs it. For children who might become disoriented in the dark, a glow-in-thedark model such as the one at www.garritylites.com/site/retail_details.php?recid=4&cat=5 can prove helpful (however, you should still have at least one waterproof model available to par-

ents). You can find a number of flashlight companies at www.batterysavers.com/FlashlightLinks. html.

Every bedroom in your house should have one of these flashlights. Make sure you don’t use them for everyday use. These are special emergency flashlights, and everyone in the house should realize their importance. Test the flashlights at least four times a year and replace the 172

Some companies sell flashlights that don’t need batteries—you shake them to power them. The flashlights contain magnets that create enough power to last twenty minutes. You can find these flashlights on Web sites such as Safety Think, Inc. (www.safetythink

.com/products/-/22}

and

Micro

Forever

Flashlight

(www.modernoutpost.com/gear/details/

ee_shakelight.html). While shakable flashlights can be pricey, there appears to be plenty of vendors, sizes, and price ranges available. The best part about these products is that you don’t have to worry about the batteries not working when you turn them on.

batteries as needed—at least once a year in many cases. The flashlight should have a strong steady light. The Garrity waterproof flashlight features one of the super-bright krypton bulbs; LED bulbs can also provide good light.

Testing Flood Sensors The test you use for a flood sensor depends on the kind of flood sensor you own. Vendors use a

number of techniques to detect the presence of water. Check the vendor documentation first to determine if your flood sensor requires a particular procedure. If the documentation doesn’t include a test, then try to contact the vendor. The procedures in this section can help when you

can't obtain a procedure from other sources. Look at the end of the cable when working with a cable-type flood sensor. The end normally has

a rubber piece on it. Pressing this rubber piece normally closes a switch that sets off the alarm. Don't press hard—the switch should be relatively easy to close.

When working with a flood/water-type sensor, you need to adjust the height of the sensor contacts first using a ruler. After you adjust the contact height, use a wire or other method of short-

ing the two contacts. You should hear a local delay relay kick in first; this relay protects against false alarms in damp locations. After a few seconds the alarm will sound.

A flood alert extender detects water in larger areas, and you might have to test several devices chained together to provide the proper coverage. Test the device by shorting across opposite terminals. The alarm should sound immediately. A successful test with one device doesn’t assure that all of the devices will work; you must test each device individually. 173

Chapter 6

Testing Humidity Sensors

Testing a humidity sensor simply tells you that the device will sound at some humidity level, not that it will sound at a specific humidity level. To check the accuracy of a humidity sensor, you must send the device to a third party with precise control over environmental conditions. However, you can at least verify that the device is operational using a simple test. To check a humidity sensor, set the device to its lowest detection level. Place a steam source near the sensor—even a steaming cup of coffee will set the humidity sensor off. Make sure the steam source is near enough to the humidity sensor that the sensor can detect it. The alarm should sound within five minutes of starting the test. Testing Temperature Sensors

Testing a temperature sensor in a household environment doesn’t provide completely accurate results; for complete accuracy, you need to send the device to a third-party tester. To test a tem-

perature sensor for an average response, use a thermometer to check the temperature near the device. Set the temperature sensor 5 degrees lower than the room temperature (or the device's

accuracy range, whichever is greater). The alarm should sound within five minutes of starting the test. Items You Can’t Test without the Right Equipment

Some security devices are so exotic that you can’t easily test them using standard equipment found in your home. In fact, you might not find the equipment you need for testing for sale or

at least not within the homeowner's reach financially. For example, you can test some gas detectors, such as a smoke detector, using a low-cost product. However, a radon or carbon monoxide detector requires special test equipment. In these cases, you should obtain help from a third

party in determining whether your equipment works. Leaving it untested isn’t a satisfactory solution in most cases.

You'll also want to send devices that require highly accurate testing conditions to a third party. For example, you can test a temperature or humidity sensor with some degree of accuracy at

home, but you really need to send these devices to a third party when you want to ensure accurate results. The greater the accuracy requirement, the more likely it is that you'll want to send

the device to a third party for testing. 174

Testing

theSetup

Unfortunately, you won’t find many third-party device testers on the Internet or even in your local telephone book in most cases. Generally, you'll want to contact the security vendor for suggestions for testing. Some security vendors provide full device-testing services in addition to selling their products.

USING AN OUTSIDE TESTING COMPANY

You installed your own security system and you know it works because you've tested it yourself. The big question is why you should pay to have someone test a system that you know works. Most homeowners who install their own security system will want to test it themselves, but this proce-

dure can lead to problems. Insurance companies won't accept your word that you’ve maintained your security system; they want the written results provided by a fully qualified and licensed company. Consequently, one of the biggest reasons to use an outside testing company is that you lack competence or ability—you must address the concerns of your insurance company that the security system works as advertised. Many security system monitoring companies also offer security system testing. Using this service ensures that someone tests your security system regularly. However, it doesn’t guarantee that the

company performs the task properly. You need to watch what the person testing your security

system is doing and ensure that the task is done correctly by knowing something about the testing process yourself. In other words, using this option probably won't save time, but it will save

effort. This is a good option for someone who has the required testing knowledge but not the skills to perform the task personally.

According to Deputy Mueller, you should avoid giving the security system vendor or the monitoring company any more access than necessary to your house. More access usually translates into a higher probability that the security system vendor or monitoring company may steal from you. Make sure you spend the extra money to obtain services from a company that screens all of its employees, pays them well, monitors their work, and regularly audits their records to look for possible sources of trouble. Make sure that the security vendor and monitoring company are both bonded and have insurance that protects you against actions by their employees. Always get written proof of licensing, certification, bonding, and insurance and keep it with your records. Sr nnn ne

cee UtttttItIdIIIIIIIINIIIIIIISISSSSISSSSISSSSSSSSSS

175

Chapter 6

Most monitoring companies provide some type of testing service, but few publish details of the service. The few that do, such as the Home Security Store (http://monitoring.homesecurity store.com/faq.aspx), don’t provide many details. In this case, you call the Home Security Store

and tell them that you want to perform a test. They place your system in a special test mode that lets you run any test your system can perform. When you finish the test, you call again and they place your system back into its fully functional state. Missing from the Web site are any details on how they report the results of the tests back to you. Consequently, when working with this company, you should request information on how they report the results of the test to you and ensure that you'll receive accurate results. The Home Security Store Web site does provide a lot of very useful information about what you should expect from your monitoring company.

CoNDUCTING A PowER-OFF TEST One important question that you might not have considered is what happens when the power goes out. Without a power-off testing scenario, you don’t know what will happen. Your security system might not work at all. Consequently, you should periodically test your security system

with the power off. Use the same procedures as you do for a power-on test. Besides testing the equipment, you also need to test the most important part of the power-off

scenario, the battery. Without a backup battery, your system is dead. The focus of this section,

therefore, is determining the health of your battery and learning how long it can last with the power out.

The capacity of your battery determines how well your security system can protect you and your house during a power outage. Intruders often take advantage of power outages to invade homes that normally have security system protection. The battery in the central control panel has an amp-hour (AH) rating. However, the AH rating doesn’t tell you how long the battery will last. In

fact, the security system vendor can’t tell you how long the battery will last either, at least not with any accuracy. Fortunately, you can determine this value using a multimeter. Change the multimeter settings to read amperage. Disconnect only the red battery lead from the central control panel. Attach the red multimeter lead to the battery lead and the black multimeter lead to

the terminal on the central control panel. You'll read the small charging current for the battery. Now, turn the power to the central control panel off, so the battery is supplying power for your

security system. The amperage you read is the current the security system uses. Table 6-1 tells you how long the battery can supply power to the security system based on this information. 176

ee

Testing the Setup

Table 6-1. Battery Last Time, in Hours a e Ne

Security System Current, in mA*

pe

Ee ee lS

1.2 AH**

2.0 AH

pera mii ry DEN vay uu riey 18.18

*mA = milliamps

ee

Battery Capacity a ee

BYR

eee

BE)

3.0 AH

7.0 AH

ied

see

**AH = amp hours

Locate the amount of current that your security system requires in the left column. Follow this row across until you find the AH rating of your battery. The value in the cell is the number of

hours that your battery will last. A good battery backup will last at least four hours, a better battery backup lasts at least eight hours, and the best battery backup lasts twelve hours or longer. Consequently, if your security system uses 300 mA, you need a 2.0 AH battery to obtain a good level of battery backup, a 3.0 AH battery to obtain a better level of battery backup, and a 7.0

AH battery to obtain the best level of battery backup. After you complete this test, reapply house current to the central control panel, disconnect the multimeter, and reattach the red battery lead.

The presence of a charged battery doesn’t necessarily mean the battery will work as anticipated. Damaged batteries may show the correct voltage when fully charged but not hold their charge long enough to provide useful service. The last power-off test you should perform is to verify that your battery has sufficient useful life. Begin by removing power from the central control panel. Measure the voltage across the battery leads. Wait twenty minutes and measure the voltage across the leads again. The voltage should drop only slightly. When you measure a drop of more than 1 volt between the two checks, replace the battery; it no longer has sufficient capacity to power your security system reliably. 177

battery power than you actually need for a security system. You might predict that most emergencies will last a certain time, but you want enough power to last through a long power outage. It’s always more cost effective to buy a larger battery than you need now than to buy a second battery later when you find that you didn’t purchase enough Always get more

power at the outset.

Make sure you understand the power requirements and features of your security system completely. For example, a typical X10 security system module has a simple 9-volt battery back up.

A battery this size will allow the X10 system to dial out after something triggers a wireless device, but the alarm won't sound and the lights will not flash. Adding a simple uninterruptible power supply (UPS) for the sirens would help the X10 system provide better security. In fact,

you might want to place the entire X10 system on a UPS so that it has full functionality for a longer time.

LeET’S START SECURING This chapter has demonstrated the need for three kinds of security system testing. The first is installation testing, where you verify the operational state of the system and establish a baseline for future comparison. The second is maintenance testing, where you confirm that the current

state of your security system matches the baseline state. When you see differences between the two, you know that your security system has degraded and you need to repair it. The third is diagnostic testing, where you know a problem exists and you want to locate the source. It’s important to remember that this third form of testing can also show you potential problem

sources and help you create a work-around so the problem doesn’t occur again (or at least as regularly).

Now it’s time for you to decide how to test your security system. Begin by creating your own maintenance plan and ensure that you follow it. Contact an outside company to perform the testing for you if you don’t want to do it on your own. Otherwise, make up a tool list and list of other

products you need. Always check with both your monitoring company and the police/fire departments before you test your system. Failure to clear your testing with everyone could result in fines for generating a false alarm should the testing setup fail. 178

Testing the Setup

It’s not always easy or even practical to remember to perform every security system task manually—sometimes a little automation is both practical and efficient. Chapter 7 discusses several forms of automation you can use with your security system. This is an optional chapter; if you

have a simple security system, you might not want to use any automation at all. Consider automation a means of ensuring that you complete specific tasks on a more complex system. It’s a way of ensuring the security system remembers to do something, even when you don't.

179

PN

reds Hoy ep ,

Al

pale

abryelie

Maa _

7

“ye

“DW

aot}

Bt. y

ie

. "

joe

= as

4 .")

~

7

|

es

ijn

is

=f

7

Sri

|

n

dog



f 7

uJ

hitntog a

ff aw

ee. al

:

-

LY alae

'

ae

-

j—*

De

ae ws

,

Sap

i

U.

‘aa

i

aah ’ ra

‘So ae

beter

cult hee anya

my

:

i

ra

ntact

:

Bk

oe

6

tls ema

vane

realtya

a tea 7

:

ADDING AUTOMATION AS NEEDED

“his chapter answers a basic need for most people, who are trying to do more in less time | and with less effort. Automation can save time and effort when it comes to just about any human activity. Letting the machine do the work is definitely appealing. Of course, you always have to maintain a balance. Using automation means giving up some control of the security system, and it also means that you might not become immediately aware of problems, even if the

automation provides a full report. Consequently, this chapter focuses on balanced automation— the level where you remain fully aware of the security system yet gain as many benefits as possible from the automation it can provide.

Automation doesn’t occur at just one level in any moderately complex security system. A better central control panel lets you automate certain tasks, but you also need to consider other system elements. For example, if you use a personal computer as part of your security solution, the opportunities for automation are significantly greater for some tasks. Some of the automation you can perform with a security system also involves communication. Depending on the kind of connection you use to monitor your security system from work, for example, you can automate certain data-related tasks, such as backing up your log files or making a duplicate copy of camera data. In this case, automation performs a secondary task of maintaining the integrity of your data so that you have it for later use, even if you damage the original copy. 181

Chapter 7

In addition to built-in automation, you can add automation to any security system by adding specialized devices. Adding timers and other features to your security system lets you automate certain tasks, such as turning the lights on at a specific time, and improve security. Ultimately, the

decision of whether to use some form of automation still lies with you. You need to decide what

level of automation is appropriate for your specific security requirements. Even with all of these good results of using automation, you still have to keep it in balance with

your other security goals. When automation becomes a crutch for not maintaining your security system as you should or focusing on the data it provides, then you need less automation and more hands-on time. This chapter also discusses some of the warning signs that you're losing contact with the security system and ways around the problem without disabling automation completely.

DiscovVERING WHETHER Your SEcurRITY SYSTEM HAS AUTOMATION Before you embark on the automation journey, your security system has to support some kind of automation. Unless you read the documentation that comes with your security system, you might not know whether it supports automation. Generally, less expensive systems—the

kind that come with one or two door sensors and a motion detector—won't include much in the way of automation. In fact, some don’t include any automation, so it’s important to find out whether your security system provides automation before you read this chapter. After you check the vendor documentation, you might also want to look at the vendor’s Web

site. Vendor Web sites often contain lots of information that someone forgot to add to the manual or that the vendor discovered since releasing the product. It’s important to check the vendor Web site from time to time to discover these additions. You might find that your system does provide some kind of automation, even when the manual doesn’t mention it. These automation items often appear in low-level menus or require changes to the system for activation. Don't assume that the lack of the work automation means that your system lacks any form of automation. For example, many security systems contain a specialized feature that requires someone to log into the system by a specific time of the day. Vendors often promote this feature as a means for keeping track of latchkey children because the child has to deactivate the alarm by a specific time. If the alarm isn’t deactivated on time, the system notifies mom or dad, who can then take the appropriate action. This feature is a kind of automation,

even though the vendor documentation might not list it as such.

182

a

ing

Automation a5 Needed

Not all of the information found in this chapter and many other parts of the book comes from common sources. | interviewed a number of people who, for various reasons, chose to remain anonymous [or their superiors required them to remain anonymous). Because much of the information in the following three sections comes from anonymous sources, | was especially careful in compiling it and have included only information corroborated by three or more sources.

UNDERSTANDING AUTOMATION BASICS Automation is another tool in your security toolbox. As long as you approach automation as a tool,

and not as a crutch for avoiding security tasks, it can provide an invaluable service. Security systems provide a wealth of automation. As the complexity of your system increases, so does the

amount of automation that you can expect from it.

Some security systems are more likely to provide automation. Standard security systems provide a good level of automation. As you move on to X10 security systems, you'll find that the amount of automation increases substantially. When you have a personal computer involved in the security picture, you often obtain the best level of automation available because the personal computer is so incredibly flexible. The following section describes good, better, and best automation practices based partly on the availability of automation with certain security systems. Good Automation Practices

Even an inexpensive security system can make use of timers and various discrete sensors. Used carefully, timers can make it appear that someone's home even when no one’s there. For exam-

ple, if you get home from work every day at six o’clock and turn on a light in the living room to read the paper, add a timer to perform that task automatically so the light goes on even when you aren't home. When you add photosensors to turn some lights on according to the external light level, the house’s light pattern becomes more random, just as if you were home. You can add this modest level of automation to a home at a relatively low cost and improve home security considerably.

Timers and photosensors become problematic when they become too predictable. When someone cases your house and notices a pattern in the lighting, the precautions you take become worthless. 183

Chapter 7

Lighting need not become an expensive proposition. It’s amazing to see the number of solar powered lighting alternatives appearing on the market today. In many cases, : these lighting solutions can provide security where it’s inconvenient to run electricity. For example, the LED Light.com Web site at www.theledlight.com/solarpower.html includes a number of interesting alternatives. Unfortunately, these solutions are also a little on the expensive side to purchase; you'd make up some of the cost differential with other solutions by not having to supply power to the device or replace the lightbulb. Theoretically, the purchase price is all that you'd ever need to pay for a lifetime of light [you'd need to replace the battery periodically and might also have to replace the solar panel at some point).

In fact, according to expert burglars, a regular lighting schedule is one tip-off that no one’s home,

and one that they always look for. A good automation practice is to use the timers and photosensors when you're gone. Don’t use them when you're home because the pattern will become too apparent. The timers and photosensors should mimic your natural pattern of light usage, however, to ensure that it doesn’t appear that anything different is taking place. If you turn your bedroom light on after the ten o’clock news, add a special timer to turn a light on in the bedroom. You can learn

more about timers and sensors in the “Adding Timers and Sensors” section of the chapter. These automatic light devices aren’t just for fooling intruders. You should add automatic lights to your house to meet specific needs. For example, providing a path of night-lights can prevent falls.

Using night-lights with photosensors ensures they always turn on when light conditions require it. Providing a light in your garage or entryway that’s on a timer ensures that you always have a light on when you come home, without burning up power all day long. Using motion-detecting

night-lights or standard lamps in rooms ensures that the light always turns on when someone enters the room. You can get special timed versions of these lights for bathrooms that turn the light on and off after a specific time to reduce energy costs. Special switch options provide dimming, three-way (on, off, automatic), or manual switching options. You can even find variations of specialized light switching on the Internet. For example, the electronicsforu.com Web site (www.electronicsforu.com/electronicsforu/Circuit/mohitcir

cuit.asp?p=5) contains several interesting circuit ideas, including an automatic bathroom light. In short, the same technology that keeps intruders at bay can also provide a measure of home safety,

so you don’t need to make a special purchase to provide special lighting when you need it. 184

Adding Automation as Needed

Good automation practices also require that you exercise care when setting your security system. For example, many security systems provide an automatic method for disabling some security zones. The security system might provide a higher security level during the evening hours and then automatically turn some of the zones off at a specific time to let you move around the house freely. You can perform the same task manually, but having the security system do it automatically reduces your workload and makes false alarms less likely. However, this feature can also become a trap. An intruder can take advantage of this feature when you leave home for a vacation if you leave it in place. This is an example of a security system feature that you might not want to use at all so that you're always aware of the need to set the security system automation correctly,

Many security systems also provide a child-at-home feature. When the child doesn’t come home on time, you receive notification. This is an excellent feature for keeping track of latchkey children, and you should always use it when it’s available. However, you also need to disable this fea-

ture on the weekend and during vacations. Otherwise, the security system generates a number of false alarms that could attract unwanted attention. Some automation is unaffected by your presence or absence from the house. For example, if your

security system can perform a self-test at specific intervals, you should let it perform the self-test even if you aren’t home. You can always review the security system logs later to verify that the test was completed successfully. The point is to maintain automation that your location doesn’t affect. Maintaining your system using automation is a good idea as long as you remember to check the log files. Automation isn’t the end of the process in this case, but it does save you the time and effort of performing the test manually. Better Automation Practices

You can obtain a better automation setup for your house by adding the techniques in this section to those found in the “Good Automation Practices” section. Timers are more flexible than you might think. Most people don’t think about the fact that a timer only runs when it has power applied. Consequently, you can create a random light timer by connecting two timers together. You can create seemingly random events by applying power to the second timer only for a certain amount of time each day. For example, you can set the first timer to apply eight hours of power to the second timer each day. Set the second timer to turn a lamp on for two hours. Using this setup, the lamp would tur on for two hours every third day. It’s an inexpensive way to add randomized lighting to your home and make it less likely that an intruder will risk entering the home. From outside, it’s very hard to tell that no one’s home because you have some lights com185

ing on at sundown, some going off at predefined times, and still others going on and off at seemingly random times.

Fortunately, you can find a more direct solution to the problem of providing a random light source in the house. When you use an X10- or personal computer-based security system, you can

randomize the on and off cycles of the lights in your house. The lights will still turn on and off at

approximately the same time, but the precise starting and ending times change every day. A change of as little as a minute or two each day is often enough to fool the experts. Of course, it's better to provide a noticeable change in time, as much as fifteen minutes either side of the

median time you set. You can see examples of X10 variable timers on the Smarthomepro Web

site at www.smarthomepro.com/x10timers.html. Note that you might have to put some of these devices into security mode to obtain the random time interval. You can see examples of personal computer setups on the same Web site at www.smarthomepro.com/1142.html and www.smart

homepro.com/pcbased.html. Automation also means using smart devices to ensure that something as simple as watering the

lawn doesn’t give you away. According to the experts, seeing an automatic water sprinkler running on a rainy day or the day immediately after a relatively large rainstorm is a certain sign that the owner isn’t home. Most people turn the automatic system off when they see it running at an inappropriate time. A good way around this problem is to get a sprinkler system that measures

actual ground moisture and only waters when the grass is dry. Not only will this setup save power and water, but it also alleviates the problem of the sprinkler turning on during a rainstorm. Best Automation Practices

The best automation practices involve everything discussed so far and more. Many people think that lights are all they need to convince someone casing the house that someone’s home. Lights do work. Most intruders won't risk detection when you have your house lighting set up correctly.

However, a person who thinks that you have something special to steal (perhaps he saw you move that new television or appliance into your home) will listen for sounds too. You can use a number of noise sources that turn on and off with a timer. Use a timer that’s set especially for the task,

not the same timer as the lights. For example, if you play the radio and shave every morning at around six o'clock, set up a radio on a timer with the appropriate station set and use a tape

recorder with several days’ worth of natural sounds to augment the radio. Using this technique makes it very hard for someone listening to your home to determine whether you're actually there. 186

Automation asNeeded Adding OTHER TECHNIQUES To KEEP YouR House SAFE Don't sabotage successful automation by leaving invitations for intruders to visit your house in plain view. For example, many intruders will look for packing boxes near trash cans as an indicator that a house has a new appliance. In fact, according to the experts, some intruders will actually take jobs as sanitation engineers (trash collectors) to make their spying

activities less obvious. Leaving a packing box is akin to leaving a sign on your front door saying that you have something to steal. Break the packing box up into small pieces and place it in an opaque trash bag. Don't overfill the trash bag either; fill it so that no one can tell what is

inside. People tend to leave many signs that they aren’t home. Consider these simple tip-offs for

intruders: mail and newspapers not getting picked up, packages left at the door for too long, driveway not shoveled in the winter, no tire tracks in the snow leading into and out of your driveway, and no footprints in the snow. Although these items aren't automation related, they do let the intruder know that you aren't around. Fortunately, a good neighbor or friend can take care of all of these tasks for you. Ask someone to stop by your house daily to do these tasks and, if possible, to spend a couple of hours around the house so any intruders can see a

human presence. “Some people recommend stopping your mail and newspaper, but this can prove prob-

lematic, too. One person | talked with normally doesn’t have his mail and newspaper stopped. The town he grew up in had several cases where the newspaper boy and his friends knew who was on vacation because their paper had been stopped. They proceeded to help themselves to

items in the house. This person had heard of the same thing with the mail. Stopping your mail

and newspaper is just another way to tip someone off to your absence. Before you leave on vacation, make sure you spend some time reviewing house security. Think like an intruder. Look for places that someone could enter the house; include the

unlikely as well as the more common doors and windows. Remove valuable items from plain view. If an intruder can't see anything of value by looking through the windows, there's a chance he might think the house doesn’t have much appeal.

187

Chapter 7

One way to improve automation is to couple a personal computer with a home automation technology such as X10 or ZigBee. You can build macros that address various conditions that the sensors will detect. The macros control the home automation technology and help it do a better job of adjusting to varying conditions, including weather. The macros can also add randomness and even vary lighting, sound effects, and other schedules according to the day of the week. Using technologies in combination like this can make it seem that you are at home. The system can do everything but take out the trash. Don't discount some of the odder-sounding technologies. For example, some security systems

can be set to call you on your cellular or office telephone when someone rings the doorbell. You can talk with the person just as if you were standing on the other side of the door. This particular technology answers the scenario where an expert intruder will ring the doorbell, just to see if someone responds. The intruder typically poses as a salesperson, someone affiliated with a reli-

gious or nonprofit organization, or someone who is new in town and lost. You can address all of these needs through the intercom without ever needing to open the door. The Quantometrix Web

site at www.quantometrix.com/doorwy_door_entry_phone_systems.htm

provides

some

examples of this type of system. In some cases, it doesn’t matter who provides some types of automation. For example, you could

easily assign the task of answering the door intercom to a trusted friend, neighbor, or relative because the intruder doesn’t know where the voice is coming from or who lives at the residence. Theoretically, you could also have a monitoring company perform some of these tasks for you,

but it depends on how much you trust the monitoring company and the monitoring company’s

policies. Generally, a monitoring company is a last choice for automating away-from-home tasks because you might not want company personnel to know you’re away either. Remember, monitoring companies with poor hiring policies are sometimes the source of break-ins—the company could end up hiring the intruder who breaks into your home if you give the monitoring company too much information.

At some point, it's important to take a step back. Looking through all of the gizmos and widgets described in these three sections, it’s easy to become quite overwhelmed if you aren’t into gadgets or get so excited about all of the possibilities that you forget the goal of all of this technology. The goal is to provide peace of mind, to create a safe home environment. Implementing all of the neat ideas in these sections quickly achieves another goal: too much work. If you’re working so hard on the automation that you lose the time that you were planning to save, then the automation has become too complex and you really need to consider simplifying your setup. 188

(ee

Ri ea

ee eee

Adding Automation as Needed

CONSIDERING THE TYPES OF AUTOMATION Automation comes in a number of forms. You don’t have use every form, but using some automa-

tion is always a good idea to ensure that certain tasks are completed without fail. Here are the basic automation categories: ¢ Security system

¢ Special devices ¢ Personal computer e Timers e Sensors

¢ External resource (such as a friend, neighbor, relative, or monitoring company)

Each of these categories has something to offer in the way of automation. For example, your security system can perform diagnostics automatically, saving you time and effort. The following sections provide an overview of the types of automation you should look for when buying your security system if automation is an important requirement. Security System

Security systems offer alarm and testing automation. You typically won’t find other kinds of automation associated with the central control panel or the security system as a whole.

Alarm automation can include everything from whom to call when an alarm occurs to how to

react to the alarm. Sometimes you can set the security system to perform more than one task for a given alarm. For example, you can set the alarm to call the fire department and to call you as

Some people are almost certainly going to associate the child alarm with latchkey children and not use it for any other purpose. However, you can use this alarm when-

ever you need to monitor system activity. You might ask a neighbor or even pay someone to check your home each day at a certain time. The child alarm lets you monitor this activity. The person responsible for the task deactivates the alarm each day at the given time to perform the check you request. When this isn’t done, you receive a notification of the fact and can verify what has hap-

pened.

189

Chapter Te

7

Muhammad and Marilyn Kharbush run Deli Bean, a coffeehouse/restaurant that is a typical small business scenario in many locations. The restau-

rant is in the middle of an active downtown section and is only open during daylight hours when

people buy products for breakfast or lunch. Living quarters are above the shop, so security becomes

more complex. Photo used by permission of Muhammad and Marilyn Kharbush.

What do you feel are the personal safety benefits of installing a security system with fire or other forms of emergency detection? I'LL assume here that our locality is not filled with businesses and homes with security

alarms. Therefore, police or security companies do/will respond seriously if an alarm is triggered, especially because our business is very near the police station. Having a security system would let someone know if there was a break-in or fire. In our case, when we are

closed, if the electricity or a circuit breaker to our larger freezers or cooler went off, we would definitely save money if this were included in a security system. [Note: See “AC Current” in chapter 4 for a description of a sensor that automatically generates an alarm when the AC power is off.] Also, having an automatic dial-up to the police would help in the case of a medical emergency or holdup.

What kinds of monitoring would you get for your business [intrusion, fire, carbon monoxide, radon gas, flooding, and other}? We would want to monitor for intrusion, fire, electrical failure, or tripped circuits.

Which security system add-ons such as panic buttons [fire, police, and/or medical) do you think you might add?

We would add police and medical panic buttons. Are you likely to add physical security features such as improved locks and window-glass film (that resists breaking) before you add electronic security, and why?

Our locks are good now. In fact, we just had them replaced. Window-glass film would be a nice addition, and we want to add a glass break sensor. If a window breaks, it could mean a

190

=e

ee

Adding Automation as Needed

break-in. However, it more likely means a storm or a car accident (or an explosion at

Wisconsin Dairies). [Editor's note: The community suffered the effects of an explosion ata local grain factory within a year of this interview. All local homes and businesses suffered _Mmajor window breakage from the concussion of the blast, even if they weren't within the fallout radius.] The value of individual items inside our business isn’t that great, so we're

_ not sure how concerned we should be. Q. Do you plan to augment your physical security by adding window bars or other alternative security elements?

A.

Not at this time. [Editor's note: The business is on a main street that the police patrol all of

_ the time. A break-in from the front is unlikely and the police would notice immediately if someone attempted it.] Q.

Would you extend the security system to encompass any living areas above the business _ environment or use a separate security system for living areas?

A. Another renter is upstairs now. We would probably have some type of security system for

the upstairs too. We're not sure what. If we decide to use the area ourselves, then we'd

extend the security system. Q.

Given a choice, would you have a third party install the security system, install part of the

security system yourself and have a third party install the other part, or install all of the security system yourself?

A. We would definitely have it done by a third party. We're not gifted in this area. Q. How much would you weigh the cost of the security system against the potential benefits {personal safety, safety of goods, reduced paperwork requirements, better business repu-

tation, etc.} that it can provide? A. We would weigh each potential benefit against the cost. We want our employees, family

members, and customers to be safe first. Then we would look at the possible losses from a break-in. Again, personal safety is first. If none of us are there after hours, losses due to theft would probably not be as great as a freezer or cooler failing. Our security system

should be geared toward losing products while we are not there, and protecting people

while we are there {almost exclusively during the day]. Q.

Are you aware that most insurance companies provide a discount for installing a security system and that this discount can vary considerably?

A.

Yes.

Q.

How would you rate the following security goals and their importance for a small business

+71

MNS PC Chapter 7

or home installation?

First, protection (1 want to keep the burglar at bay using a combination of electronic and

A.

physical security). Our business is located on a fairly busy main street and only open during daytime hours. | am concerned about burglary at night, but at least no one would be injured/traumatized. | rate this as a medium concern.

Q.

Determent [I want to scare an intruder away).

A.

This would be an ideal security system—no damage to person or property, and no intrusion. | rate this as high importance.

Q.

Monitoring {I want to know who is snooping around my home, even if they don’t enter it

illegally). A.

| consider this with determent. Automatic motion lights both inside and out should help

deter possible intruders. Q.

Outside assistance [| want to have some means of contacting someone in an emergency,

no matter what that emergency might be). A.

A panic button could be very useful for personal safety or a medical emergency. | rate being able to contact someone quickly as very important.

Q. Self-defense (I want to keep myself safe). A.

| think training of family and staff is very important here. | think wellhave a meeting and talk about how to handle a number of different situations. An emphasis on not getting revenge, only protecting yourself, is important.

well. You might also notify a neighbor who is home when you aren't to direct the fire department until you arrive. Alarm automation can also include events that will set the alarm off. The childat-home alarm is just one example of this application. The idea behind alarm automation is to ensure the alarms behave as you need them to, even when you aren't present. Testing automation is an essential part of complex alarm systems. You want to ensure that the

central control panel and all connected devices are working as expected, even when you aren't

home. The level of testing automation varies by the complexity of the system. Systems that are more complex provide better testing because they have more components to test. The best central control panels provide programmable automation. They often use a serial port, Ethernet adapter, or other personal computer connection. For example, you can program the 192

eee GING Adding

Automation as aS Needed NECTED Automation

MISYS2-ELK M1 Security Automation Control Panel found on the Home Security Store Web site at www.homesecuritystore.com/ezStore123/DTProductZoom.asp?productID=1119 using a standard personal computer. Here are some other interesting automation features of this central control panel—features that you can find in other high-end systems too. Two-way listen-in interface Flash memory that allows field updates to firmware electronically Connection options including RS-232 serial port to interface to computers and peripheral devices, true V.22 bis modem for fast, reliable upload/download, and an optional Ethernet port for reporting operation/control or programming Time/date stamped 512-event history log Menu-driven, full-text keypad programming Voice announcement

of alarms, zone descriptions, status, and other information that

includes a 500+ word/phrase vocabulary, ability to link up to 6 words/phrases per announcement, and 10 custom recordable words/phrases Fire alarm verification routine

‘Can be partitioned into eight separate areas and account numbers Up to ninety-nine user codes (four or six digit) with assignable authority levels Multiple arm levels including Away, Stay, Stay Instant, Nite, Nite Instant, Vacation

Supervised phone line, alarm output, and auxiliary overcurrent protection

Built-in telephone remote control that makes any telephone a keypad Integrated voice dialer that uses vocabulary or custom words/phrases Multiple digital communicator formats including Security Industry Association (SIA), Contact ID, 4+2, and Pager Installer telephone (butt set) test feature

Elk-RP PC software that includes “conflict resolution” to highlight differences between

control panel and PC easily, including dial-up, Ethernet, or local from RS-232 port or house phone jack, and automatic answering machine bypass

Built-in temperature sensor Programmable display of time, date, and temperature Displays system diagnostics and settings

For those who want full control over their security system, it’s important to know the rules that the security system can accept. The M1SYS2-ELK M1 Security Automation Control Panel is typical of high-end systems. It includes “Whenever/And/Then’” rules programming, which allows 193

almost any imaginable operation. Using this system, you don’t need to chain rules together. Any single Whenever event that you create can have one or more Ands and Thens (conditions and commands). The rules rely on easy-to-understand text-based references. Interestingly enough, this system lets you provide limited control over lighting and other devices directly through the security system. You can also use the interface to transmit and receive custom serial ASCII mes-

sages, read temperature sensors, and communicate with thermostats from a remote location. One of the more important self-tests for this particular system (and high-end central control panels in general) is a dynamic battery test, one that lets you test the battery without having to disconnect everything and test it using a multimeter.

When viewing specifications for some central control panels, you'll notice the term “watchdog timer.” A watchdog timer automatically resets the system when it becomes inoperable because of a software error or other problem. The inclusion of a watchdog timer is essential because it ensures that your system remains functional even after it experiences an error. Never buy a cen-

tral control panel that lacks this feature because it could lock up and stop working as anticipated. Special Devices

Special devices come in every shape and size. While writing this book, I spent a lot of time looking on Web sites for devices to use as examples. Finding new devices was a regular experience,

and the kinds of special devices never failed to amaze me. Make sure you spend some time look-

ing through the list of home security vendors in appendix A as part of your special-device research. Generally, if you can think of a special security need that is required for some kind of automation task, you can find it somewhere on the Internet.

The special devices found in stores and on the Internet fall into three categories: those that attach to acentral control panel, those that attach to a personal computer, and those that are stand-alone. Whenever you choose a special device that attaches to something, you need to ensure that the special device and the controlling device are compatible. For example, it doesn’t pay to purchase an X10 device if you don’t have an X10 network installed. Likewise, X10 devices won’t work on a

ZigBee network; the networks must provide compatibility. Personal computers can also present problems. A device designed for a PC won't work on a Macintosh. You must have the required port as well; a PC must have a serial port to support devices that require a serial port.

Stand-alone devices don’t require any controller support, but they usually provide a less flexible interface. 194

A cat deterrent,

such as the one

found on the SmartHome

Web

site at www.

eee

Adding Automation as Needed

Don't assume that your personal computer is safe now or will remain using a personal computer for security system purposes, viruses and spyware and have an appropriate firewall installed. Make sure you protect puter’s power source as well. Always install an uninterruptible power supply, or UPS, personal computer will have power during a power outage. future. When

smarthomeusa.com/ShopByManufacturer/Contech/Item/CAT-001,

safe in the check for your comso that the

automatically keeps cats

away from your garden or any other location you choose. However, this is a one-use device; it

doesn’t require any programming flexibility because it only performs one task. Programming only becomes necessary when the device provides enough functionality to require setting rules. In short, automation

doesn’t

equate

to programming.

Sometimes

a device

provides automation

without any need for programming so a controller isn’t required. One piece of automation that your neighbors will appreciate is an audible alarm that turns off

automatically after one or two minutes. The intruder will get the message immediately after the alarm goes off. However, forcing your neighbors to endure an hour or more of a screeching alarm

is one way to alienate one of your best forms of protection. Turning the alarm off automatically ensures that the intruder gets the message and keeps your neighbors friendly. Personal Computer Of all the security devices mentioned in this book, the personal computer provides the best

means of creating an extremely flexible environment. Using a personal computer, you can create macros and rule sets for any security system that provide any level of complexity and can react to nearly any event.

Personal computers are used in several ways with security systems. High-end central control panels provide a personal computer interface. You can use this interface to update the central control panel software or to give it new security rules for your house. Special devices, especially cameras, let you see what’s going on around your house using the personal computer as a controller. These devices normally provide an Internet interface as well so that you can view your home from a remote location. You can also use personal computers to control external hardware, such as a Webcam, that doubles as both local hardware and security devices. Finally, personal +95

Chapter 7

computers let you create various levels of home automation. You can control everything from lights to thermostats and receive reports from these devices.

Because personal computers are so flexible and provide such a powerful interface, one section of a chapter can’t really describe them in detail. In fact, an entire book might not be sufficient

because vendors continually create new devices that interact with the personal computer. The

best approach for working with a personal computer is to be sure you purchase devices that will work with your particular system and then rely on vendor documentation to fill in all of the details. Make sure you visit the vendor Web site as well. Even after your initial installation, the vendor Web site is likely to have software updates and add-ons that you'll want to know about. The “Using a Personal Computer” section of the chapter has additional details about working with personal computers.

Timers

Timers are possibly the least expensive way of automatically turning a device on or off. You can find several kinds of timers. Most plug into a standard wall outlet and you plug the device you want to automate into the timer. A timer can have several on/off periods during a given day. The most common configurations provide one or two on and off cycles. The type with two on and off cycles is helpful in places where you want to want to automate lights that you use in both the morning and the evening.

Good timers are easy to set using either manual tabs or digital readouts. Better timers vary the timing of automated events so that they don’t occur precisely the same time each day. The best timers provide some type of interface so you can interact with the timer using a telephone, X10, personal computer, or other connection.

Many timers now offer multiple zone settings through a central control. Each device the timer controls requires a receiver module. The timer sends a signal through the house wiring to the receiver module whenever it’s supposed to turn the device on or off. Generally, you can obtain

receiver modules in various forms that include a special lamp plug-in, wall switch, or wall outlet. You can see this kind of timer on the All Things Digital Web site at http://home-alarm-system -youdoitsecurity.com/lights-timers.asp. Some timers include a photosensor to turn some lights on automatically when it becomes dark.

These timers normally include a randomizing feature that changes the on and off times slightly 196

Adding Automation as Needed

each day. You can see an example of this timer type on the MidSouth Wire and Cable Company Web site at www.midsouthcable.com/SmartTimer.htm. Don't limit your use of timers to the inside of your home. Use timers on the outside as well. For example, you can use automation to keep your pool clean by allowing the cleaning features to run while no one is using the pool—improving security and safety as well. Turn the lights on at a certain time to make it appear that someone’s at home and ready to go for a swim. The outside activity makes intruders think twice—even the experts. Most intruders are scared away by inside activity; it makes them feel uncomfortable. Adding external activity, even automated activity, gives even the most hardened criminal pause. When you do use outside timing, make sure you

use an outdoor timer such as the Intermatic model shown at www.intermatic.com/P?action= cat&cid=44. Sensors

Adding sensors to your home security setup lets you monitor all kinds of things that you can’t normally monitor. For example, you can add a flood sensor to determine whether your basement is water free. A temperature sensor tells you whether your furnace is working correctly and alerts you to the possibility of broken pipes when it isn’t. Humidity sensors can tell you about other water-related problems, including the presence of a broken steam pipe for houses that rely on steam heating. Smoke and rise of heat sensors can detect fires and get help. In short, you can

find a sensor for just about any need. Other chapters have discussed many of the standard ways you can use specialized sensors and have pointed out the standard automation they can provide (such as summoning the fire department in case of fire). Anyone who has an X10, personal computer, or other automation system can usually find a way

to connect these sensors to the security system. Giving your security system additional sensors provides it with additional input that you can use to make it more intelligent. For example, you

could tell the sprinkler system to activate in just one room when the rise of heat sensor there detects a fire. Early response to a fire can save you thousands of dollars in damages. You won't find any security system that has these extra features installed because no one can pre-

dict how you want to interact with the additional sensors. Adding automation through sensors is generally a self-help project unless you can find someone else with the same system who is will-

ing to give you the software free.

Before you can even think about adding automation through sensors, you must obtain the cor197

Do you think you’re doing everything possible at this point to ensure your house remains unattractive to intruders? Take the home security challenge found at www.gov.on.ca/opp/crimeprev/english/factsheet_homesec.html to see if there’s more that you can do. If nothing else, taking the challenge will prove that your security setup truly is effective.

rect devices. For example, you can’t simply attach a temperature sensor to your X10 security

system and assume that it will provide you with the specialized access required for automation. You need to obtain a special sensor that includes the required circuitry for rules-based programming. For example, the MIZTS-ELK

M1 Zone Temperature

Sensor found on the Home

Security Store Web Site at www.homesecuritystore.com/ezStore123/DTProductZoom.asp?prod uctID=1127 lets you interact with the sensor using a telephone, keypad, remote control, or a

rules-based application. This sensor will provide the functionality you need to add automation through special sensor programming. Once you add the special sensor to your security system, you must first test it using standard options such as the keypad. On successful completion of the testing, you can begin building the

special rules-based application required to interact with the sensor. As with any other automation project, you must proceed carefully and test the special rules fully before you can assume

they'll work as planned. Make sure you place your security system in a test mode before you begin working with the new sensor and its program, so you don’t generate a false alarm. Even

though building custom sensor automation using this technique can prove time consuming, it’s

often worth the effort because your security system gains functionality that normally costs thousands of dollars for an off-the-shelf solution that won't provide the customization your solution will. External Resource

Your neighbor is your best external resource. Establishing a neighborhood watch is a good idea; cre-

ating a good relationship with your neighbor is better. A good neighbor can watch out for your home while you're away far more intelligently than any security system. The neighbor can also let police in for you if someone does break in and can secure the house afterward. If you trust your

neighbor enough (something that always takes time, but is worth the effort), the neighbor can call a locksmith for you to replace broken locks or windows. All of this “automation” comes from 198

dingAutomation asNeeded extending the hand of human friendship to another person. Always keep your neighbor in mind when you set up a security system.

When you don’t have anyone else you can trust, rely on the monitoring company to provide the support you need. However, remember that the more access you give the monitoring company,

the higher the probability that someone from the company will enter your home and steal everything in sight. You can avoid this problem in some cases by using automation. If you install the proper automation, you don’t have to give the monitoring company direct access to your home. What you provide is a means to check your home without actually entering by monitoring the automation.

Sometimes you won't have a neighbor you can trust and won't want to rely on the monitoring company. In these cases, you can usually find a house-sitting service that can help you maintain security while you’re gone. These services often take care of pets at your home as well, so you offset part of the cost of the house-sitting service by saving pet kennel fees. Most of these services are bonded and insured. You can check on them at the Better Business Bureau (BBB) (www.bbb.org) and places such as Angie’s List (www.angieslist.com). Depending on the service, they'll put out the trash on trash day, get the mail, newspaper, or packages, and give the appearance that someone is home. They are typically small businesses and don’t drive vehicles with

their name or logo on them.

RELYING ON SIMPLE AUTOMATION WHENEVER POSSIBLE One essential principle that you should exercise when it comes to automation, or security systems

in general, is that simple is better. Anytime you make a security system cumbersome—difficult to operate, understand, or maintain—you increase the chance that someone won't perform an essential task and your home won't have the protection it needs. A security system should provide features and functionality that become second nature to the user. After some training time,

the user should become so used to performing the required tasks that it requires little thought or effort.

A complex solution for a garage light includes detectors for the doors and a motion detector for the room. It would include an X10 connection for automation purposes and probably some form of photosensor, as well, to keep the light off during the day. You might need all of the automation, but sometimes all you really need is a light switch. The decision on what level of automa199

Chapter 7

The interview with the owners of the Deli Bean points out that most business owners aren't sure how much security they actually need. They know that they need to protect customer interests and have a good grasp of people needs, but business equipment needs are more difficult to assess. Businesses with living areas over the shop require more security, especially in the people area. Starting slow, as Deli Bean has done, can help business owners with home

requirements

balance

their setup and eventually create

a setup where

the security system

addresses specific high-value needs but might not address lower-value requirements. The balance keeps costs low, reduces risk, and keeps overall security system complexity in check.

tion you require should have a basis in actual need rather than in what you think you want. Once

added, automation can become an encumbrance rather than an aid. The problem is deciding on a particular level of automation. In many cases, you can’t make the

decision alone; you need outside help. Your insurance agent can often provide statistics for the area in which you live. For example, you can discover how many people have had break-ins during the last several years and determine which break-ins occurred through the garage. Talking with the local police can also help because you can learn about current trends in your neighborhood. Ask family members how often they'll really use a device. Getting as much information as you can about the requirements for your security system can really help in deciding what forms of automation to use. Sometimes, it’s better to use the security system for a while before you decide on adding any automation at all. Working with the security system provides an opportunity to see what you

really need to make it work smoothly. You can make a wish list of items that you feel will make the system easier to use. By exercising patience with automation tasks, you can ensure that the

automation you install will fulfill essential security system requirements.

ADDING TIMERS Adding a timer to your house isn’t difficult. Simple timers require that you set the on/off times,

plug the timer into a wall outlet, and plug the device you want to control into the timer. The entire process can require less than ten minutes. The advantage of this kind of timer is that it’s 200

Adding Automation as Needed

very inexpensive and easy to operate; the technology is relatively simple. The disadvantage is that you must locate the timer and unplug it to make any change; it’s inconvenient, and you might even have a tendency to forget about it (something you want to avoid when using any timer technology). In addition, this type of timer is very easy for intruders to detect because it lacks the ran-

domness of other timer types.

Timers coupled with photosensors provide added functionality. Instead of turning the light or other device on at precisely the same time each night, you can vary the timing sequence accord-

ing to the amount of available light. The timer becomes more random and harder to detect. However, these timers also have an added disadvantage: you must locate them in a location with

a direct source of light. In all other respects, this type of timer has the advantages and disadvan-

tages of a standard timer.

A house-wiring timer lets you control multiple devices using a single timer control. You can place this device in your bedroom or other convenient location. Changing the setup is more convenient, and such a timer usually lets you control the lights manually from a central location as well. Better versions of this timer include a random interval for the on/off cycle, making it very hard for intruders to detect the timer, Not only does each device turn on at a different time (up to four times for most timers), but the timer also adds a random factor for each on/off cycle. The biggest disadvantages of this timer are price (it tends to be a little expensive), the need to install receivers for each device you want to control, and the requirement to program the timer—it’s not as sim-

ple as working with a single-device timer. Once you begin working with X10, personal computer, and other advanced networking systems, you can begin creating complex timer setups. In general, when you get to this level of home security setup, you need to. understand the networking components relatively well and may require some programming knowledge. For example, you can combine the Firecracker controller shown

on the X10 Web site at www.x10.com/automation/ck18a_s_ps32.html with the Firecracker Fuse Timer

software

at www.xl0.com/automation/swlla_s.html

to create

a complex timer

setup.

However, to use the advanced features that this software provides, you need to know how to work with X10 macros.

UsING A PERSONAL COMPUTER A personal computer adds an almost unimaginable level of flexibility to your security system. The automation rules and macros that your security system relies upon are only the start. You can cre201

Chapter 7

ate tools to manage, maintain, and otherwise manipulate the elements that your security system requires. In fact, it’s quite possible to create a graphical interface for performing the task. When

working with a personal computer, it’s easy to separate the functionality that the security system requires from the interface that you need to manage the security system effectively. Unfortunately, with great power comes even more responsibility. Personal computers are open

environments with well-known security problems made worse by an Internet that’s even less secure. Unless you’re very careful, any Internet connection to your security system becomes a

major security breach. You have to work carefully or an intruder will quickly gain access to your house in a way that’s impossible to detect.

The biggest problem with security systems managed by personal computers is that vendors often

target the oldest and most broadly distributed system. You can easily find new security systems on the Internet that are designed to work with Windows 95. Microsoft hasn’t supported Windows 95 for several years. You can’t obtain updates for it, and the operating system includes many wellknown security flaws. Software designed to work with Windows 95 often won't work with newer,

more secure versions of Windows. Consequently, you could find yourself working with an old

management system hoping that no one discovers just how vulnerable you are. It’s essential that you obtain security system software that works with the newer versions of Windows and then that

you follow strict security precautions to keep your security system safe. Practice system isolation. Most security systems work just fine without the personal computer connection. Disconnect the security system from the personal computer when you aren't actively engaged in a personal computer activity. Make sure you disconnect from the Internet when you don’t need the connection. Better yet, rely on a dial-up connection to work with a personal com-

puter used for security system automation. In working with personal computers, it is important to realize that most people are still heavily involved with the “gee whiz” factor that these devices can provide. A good example of this orientation is the Real Estate Journal article at www.realestatejournal.com/housegarden/ indoorliving/20030130-harris.html. The article contains a lot of great information, but it never mentions securing the personal computer. Yes, this is a great system—anyone would love to have it. However, make sure you take care of the security concerns too. Consider the focus of

articles that you read on the topic of home security. Many of them will provide you with good information, but you need to add security and consider your risks every time you make an upgrade. 202

Le

Adding Automation as Needed

WORKING WITH REMOTE CONNECTIONS

Remote connections can be helpful, but only when you secure them properly. A combination of an Internet connection and a camera setup in your home lets you see that everything is OK, that no one has broken into the home. Remote connections become even more important when working with automation. Even the best automation can get off track, so monitoring it is essential when

you plan to be away for a while. Asking your neighbor to monitor the setup is one solution, but many people end up using one of the two remote connection options in the following sections. Direct Dial

Even though direct dial is a less convenient means of accessing your home and will cost more to access from a remote location, it’s also the most secure access method. A direct-dial setup avoids

all of the security problems inherent when using the Internet. For example, an intruder can’t easily gain access to your remote setup when you use direct dial, as opposed to the Internet. The intruder would have to begin by discovering the telephone number to access the direct-dial system, break the password, and finally figure out how to work with the system. Direct dial is not as convenient, but it’s more

secure.

Monitoring your security system using a direct-dial connection is always acceptable as long as you keep the connection secret. Make sure you change security system passwords often to avoid compromise. Use a direct-dial connection to maintain the security system as well. You shouldn't experience problems as long as you observe the proper precautions. Perform automation tasks with care. Because these tasks usually require a long-term connection, someone could possibly gain enough information to break into your security system. Even so, you shouldn't have trouble if you exercise due caution in working with your security system.

Internet

Internet connections are generally a bad idea for security systems. The Internet doesn’t provide a very secure environment for monitoring your security system, much less performing maintenance or adding automation. Even so, some people will insist on using the Internet for security

because it’s very convenient. When you must use the Internet to monitor your security system,

make sure you use data encryption, change your password often, and check the personal computer often for viruses and spyware. Otherwise, you might as well leave the front door open and put a sign on the front walk saying, “Rob me!” 203

Chapter 7

Never use an Internet connection to add, modify, or interact with the automation in your secu-

rity system. In fact, it’s a good idea to disconnect all automation tasks from the Internet. When working with a personal computer, use a separate machine to perform automation changes. Don't connect this machine to any other computer or to the Internet. Be paranoid when it comes to security. A little mistrust now will save you a lot of grief later.

UNDERSTANDING WHEN AUTOMATION IS COUNTERPRODUCTIVE Automation can either help you or hinder you in reaching your security goals. More people experience the hindering effects of automation, rather than the helping effects. Automation is only productive when it helps you accomplish goals, rather than accomplishing those goals for you. Machines are effective and useful servants when you maintain control over them; they become something else when left to their own devices. Consequently, you never want to place the secu-

rity system in a position where it takes over responsibility for your house. You maintain house security—the security system is simply a tool for accomplishing that goal. With this in mind, ask yourself the following questions. Do you remember reviewing the security logs recently (within the last week)?

Do you understand the security log content? Can you remember your maintenance password?

Have you replaced any security system batteries recently (within the last six months)? Do you maintain a record of security system activities, including maintenance tasks? Have you changed the password to enter your house recently (within the last month)? Have you tested your security system recently (within the last six months)? ee SeHave you performed an external home security check recently (within the last six a months)?

9. Can you remember where you placed your security system manuals? 10. Does your household regularly participate in emergency procedure drills (within the last month)?

If you can answer any of these questions with no, think about revamping your automation policies. Anyone who can answer no to two questions probably has an automation problem and should revisit automation immediately. Answering three or more questions no means that the security system has control. Stop what you're doing and fix your security system so that you return control to where it belongs. 204

=

Adding Automation as Needed

KEEPING THE AUTOMATION SECURE

Automation is very useful in your hands and extremely dangerous in anyone else’s hands. The same rules that let you improve household security can also let someone else create security holes that you won't find until too late. Consequently, you want to restrict access to anything that affects the automation you use for your security system. When you use physical devices, such as timers and sensors, for automation, you don’t have much of a problem; all you really need to do is keep

the automation secret and not allow anyone physical access to your house without your presence. Any automation that relies on advanced networks or personal computers is more problematic. Someone who gains remote access to the system can carefully dismantle your security at a specific time, gain entry to your house, and then make it appear that the security system operated as normal. Generally, keeping all security system information a secret is essential. You don’t want to men-

tion automation techniques, not even to other family members. Your children don’t need to know

about the automation you use to protect them, nor does anyone hired to help around the house.

Disconnect any physical or electronic access to the security system from a programming device after you make any required programming changes. When your system relies on a keypad for changes, disconnect that particular keypad or make sure that no one can access the programming

function. Personal computers require extra care because they provide so much flexibility. If possible, disconnect the personal computer from the security system when you complete a programming change. In addition, make sure the personal computer doesn’t have an Internet connection

when you make such changes so no one can spy on you.

Change your automation password after each change if possible. Don’t use the same password twice. Keep any automation passwords completely secret and make sure your system is set up to

monitor any automation changes. Copy any program or rule changes to a separate machine and perform comparisons regularly to ensure that no one has tampered with your rule base. In short, make sure you actively monitor and secure the automation to prevent an intruder from taking control. This is one situation where a little paranoia is good.

LET'S START SECURING

This chapter has discussed the many forms of automation you can use to make working with your security system easier. Automation is a great help in maintaining your system and performing 205

Chapter 7

some tasks regularly. It can add consistency to the security environment, which is always a good way of maintaining better security. However, too much automation can cause you to lose focus on what’s important and why you installed the security system in the first place. This chapter also emphasizes the importance of maintaining a good rapport with your security system. Now it’s up to you. You need to determine how much automation your security system can provide. Lower-cost systems don’t provide much, if any, automation, but as complexity increases, so does the opportunity for automation. Once you know which areas you can optimize, you need to

decide how much automation to use. Make sure you focus on automation that can save a lot of time without distracting you from observing the information the security system provides.

Chapter 8 helps you understand one of the most important topics when it comes to security systems—proper maintenance and cleaning. When your security system does break down, the tips and hints in chapter 8 will help you locate the problem. In many cases, you can fix a security system problem without calling in a third party. Some devices always require complete replacement. In fact, you might be surprised at how often you can fix your own security system without incurring the expense of hiring someone to help you.

206

MAINTAINING YOUR SYSTEM

ur security system might seem impervious to damage of any kind, but it isn’t. The circuitry, physical elements, even the software, require maintenance if you want to keep your security

system operating at peak performance. Even if you hire a third party to install your security system and pay someone to monitor it, you'll very likely have to perform some level of maintenance or face the prospect that it won’t work when you need it most.

It might seem like overkill, but the best way to begin maintaining your security system is to create a maintenance plan that outlines everything you need to do to maintain your system. Once you create a maintenance plan, you can use it to create a maintenance log that details all of the maintenance actions you perform on the security system. The maintenance log is very important

because it acts as your memory. You can use it to detail all of the problems you notice, repairs you make, devices you clean, batteries you replace, and everything else you do. In fact, the maintenance log can document your actions for other parties such as a third-party monitoring company, the insurance company, and the police. It’s important to provide a verifiable source of information about how you interact with the security system.

Once you create a maintenance plan, it’s important to follow the correct maintenance procedures. As with anything else, follow the vendor instructions whenever possible. However, some

products don’t include much in the way of maintenance instructions, so this chapter includes 207

Chapter 8

basic procedures for maintaining just about every device in your security system. The emphasis in this chapter is on proper cleaning, testing, and replacement techniques.

Goop, BETTER, AND BEST MAINTENANCE PRACTICES Your security system won't maintain itself. The longer the security system goes without maintenance, the less useful it becomes—the system performance degrades because you haven't maintained it. In fact, performance can degrade to the point that the security system becomes a liability rather than a help. For example, let a smoke detector go long enough without mainte-

nance and you not only develop an unfounded sense of security but also face the prospect of a smoke detector that doesn’t detect anything at all. Of course, you don’t want to spend all of your time maintaining the system either. Consequently, you need to create a maintenance plan. Maintenance actually falls into two categories. First, you must perform certain cyclic mainte-

nance such as cleaning the lenses on your security cameras. Second, you need to validate equipment performance and replace parts that haven't failed but are worn enough that they soon will

fail.

Good maintenance practices include creating the maintenance plan and setting up a maintenance schedule. Make the schedule realistic so that you can actually follow it. The planning work doesn’t count for much if you don’t follow through and do the required work. Be sure to keep the required cleaning materials handy. You might want to set a special place aside to store chemicals such as the alcohol or compressed air used to clean internal equipment areas. If the entire household pitches in to clean the security system, make sure that one person is still responsible for checking items off the maintenance list to ensure you don’t skip anything. A good maintenance practice is to clean and test your system at least twice a year, probably around the same time you replace your furnace filter or clean the air conditioner. A better maintenance practice includes everything you do for the good practice, but you perform

the maintenance action more often—-a minimum of quarterly. In addition, you might want to spend more time reviewing potential security system upgrades, even though this requires more time and effort. The sooner you implement the latest technology, the less likely it is that an

intruder will exploit a flaw found in the older version of the security system. You might also want to use this time to carry out household training. For example, check out your escape plan to 208

aout

Maintaining Your System

Taking your security system offline to maintain it is a necessary risk, but you can reduce the consequences of that risk. Try to schedule activities on a random day so that intruders don’t begin planning activities around your maintenance schedule. The experts state that it’s nearly impossible to hide maintenance activities, so the next best way to avoid problems is to make the maintenance schedule unpredictable to those outside the household. Make sure you do

maintain your security system regularly. For example, when you follow a monthly maintenance schedule, it doesn’t matter whether you perform a maintenance action twenty-nine, thirty, thirtyone, or even thirty-two days since the last maintenance, but you wouldn't want to extend the maintenance times too far in either direction.

ensure it still works. You might also want to train household members to perform additional security tasks as their skill level improves.

The best maintenance practice begins with performing general maintenance once a month to

ensure that everything stays clean. You can actually save money by following the best mainte-

nance practice because none of the devices will build up a layer of dirt that’s difficult and time consuming to remove. The best maintenance practices include keeping detailed records and a personal log about maintenance actions and repairs. Don’t keep anyone, including yourself, in

the dark about the status of your security system. Setting a Maintenance Plan

Nothing works very well if you don’t have a plan. Consider how many plans you create every day. You get up in the morning and rely on a plan to get to work on time. Once you get to work, you create a plan for the day. You have to shop after work, so you create a plan to get there, get everything you need, and get home within a reasonable time frame. Once you get home, you

restock the shelves with the new food using a plan you created at some point. In fact, it’s very likely that you don’t do much without creating and executing a plan, even if that plan only exists in your mind. Like everything else in life, security system maintenance requires a plan. However, because this plan is more complex than going to the store to restock your pantry, and more important as well, you'll want to write it down.

Your maintenance plan should start with a list of devices. Be specific about the location, type, and purpose of each device. Once you have a list of devices, check the vendor documentation for 209

Chapter 8

maintenance procedures. Record the manual and page where you can find the procedure for future reference. Make note of any supplies you need to complete the procedure so that you have a handy list in one place. Verify that you can carry out the procedure or look into obtaining help from a third party if you can’t. If your manuals are like so many out there today, you won't find a

procedure for maintaining the device. Don’t worry, you'll find lots of great information in the “Cleaning the System,” “Performing Random Testing,” and “Updating Your Equipment” sections

of this chapter.

A good maintenance plan begins with the creation of the plan. The maintenance plan describes the cleaning and testing cycle for each device. It also provides information on mandatory replacement of some devices, such as a smoke, radon, or carbon monoxide detector. These devices might

not actually contain bad components, but the components may be old enough that their behavior is suspect. The point is that you know what to test and clean, when to test and clean it, how to test and clean it, and what results to expect.

A better maintenance plan includes additional information about each device. Instead of simply recording the name of the device, include the part number, the name of the vendor, and even the place you purchased the part. Because security components can become expensive as the complexity of your security system increases, you might want to compute the amounts you'll spend on average each year to maintain the system and put this money aside on a monthly basis.

Some years you won't use the full amount saved, but other years you'll spend more than average and the money will already be in a maintenance account. The best maintenance plan includes descriptions of past, current, and future changes to the sys-

tem. Planning lets you save the money for an upgrade over time. In addition, a great plan will let

you discuss your ideas with a professional in an intelligent manner. You might discover that an upgrade isn’t worth the cost and time for your particular setup because it won't provide the ben-

efits that you think it will. Or you might find that discussing plans with a professional points out holes in your security or flaws in the planned implementation. The best maintenance plan buys

time to make decisions based on what you actually need and what will actually work in your situation.

Equipment Replacement No matter how well you test and maintain your security equipment, it will eventually require replacement. Among the most important pieces to replace are the various gas detectors—every210

Seana Leennoe oan

Maintaining Your System

The ten-year useful life of most detectors is predicated upon perfect conditions. You should replace the sensor more often under less-than-perfect conditions. For example, replace smoke detectors that operate in dusty areas more often because dust tends to shorten

the life of the detector inside. The same

concern

holds true for damp or cool/hot conditions.

Replace a smoke detector in the basement more often because the environment will shorten the

device's life span.

thing from the carbon monoxide detector to the smoke detector. These detectors often lack any documentation on how long they will last. They definitely do wear out, as the detectors inside the device lose their sensitivity.

When you are lucky enough to have a device that includes replacement instructions, follow the vendor suggestions for replacement. Don’t assume that a smoke detector will continue to work

beyond its expiration date; it just isn’t worth the risk to your family or you. Most professionals say that detectors of every type require replacement after ten years. That’s the longest you can reliably expect the detector itself to remain effective, even if the surrounding circuitry is still good.

Consistent and prompt replacement of old sensors is important to your safety! Pressing the Test button on a smoke detector doesn’t tell you whether the detector that senses smoke is any good;

it only tells you that the circuitry that supports the detector is still working (see “Testing Smoke Detectors” in chapter 6 for full details on a complete smoke detector test). Therefore, even when

the smoke detector still tests properly after ten years, you should replace it with a new one unless the vendor provides some guarantee of continued functionality after that time. When you replace

the smoke detector, mark the date you replaced it right on the device, in plain view. Include the next replacement date as well; don’t take chances with a faulty device.

Always replace equipment after you use it to ensure you maintain the highest possible readiness. For example, replace a smoke detector after a small fire in the house. The smoke detector might

still work, but then again, it might not. Don’t take chances; replace the device after it has served its purpose to ensure continued reliable alarm support in your house. You also need to check the keypads used to access the security system. The keypads will eventu-

ally fail, but that isn’t your biggest problem. The keypads tend to wear in a pattern that indicates your security access code. In more than a few cases, an intruder looked for wear marks and dirt 211

Chapter 8

ree ES sere aeec ee

You can find a number of alternatives to the standard keypad online. For example, the Circuit Cellar article entitled “Stealth Keyless Entry System” (www.circuitcellar.com/

www.circuitcellar.com/avr2004/HA3548.html, and www.circuitcellar.com/ avr2004/wabstracts/A3548abstract.pdf} shows how to build a keying system that relies on Morse magazine/17é6toc.htm,

code rather than discrete keys to enter the access code. The intruder will see what appears to be a doorbell button. Even if the intruder guesses that the button lets you enter the access code, there is no way to guess the correct combination because there's only one button. The article includes a

full description and schematics required to build this solution.

patterns on the keypad to discover the numbers used for access. Any hints you provide to the intruder reduce the security that the system provides. You can overcome this problem in a number of ways. First, change your access code regularly, at least twice a year, but more often is better. Second, clean the keypad regularly (with the system

turned off so you don’t accidentally trigger the alarm). Use compressed air (the kind for com-

puter keyboards) to clean dirt from between the keys. Lightly wipe dirt from the surface of the keys using a lint-free cloth and a mild detergent solution. One piece of equipment that many people don’t think about very much is the lowly lightbulb. You want to get the right kind of lightbulb for a particular purpose. For example, using a compact fluorescent lamp (CFL) can save considerable money when used in the correct location.

However, replacing every incandescent in your house with a CFL won't save money. You need to leave a CFL on for about three hours at a time to get the best payoff, so you shouldn’t use a CFL in locations where you need to turn the light on and off frequently. You can find a great write-up about different home lightbulb types on the Home Energy Online Web site at http://hem.dis.anl.gov/eehem/94/941109.html.

Just because a piece of equipment doesn't relate directly to your security system, don’t let it fall into disrepair. For example, you should have the fire department or a third-party vendor check your fire extinguishers regularly. Make sure you have the fire extinguisher refilled as necessary and replace it when the components begin to wear. You don’t want to hear the fire alarm, assume you can put the fire out, and only then discover that the fire extinguisher doesn’t work.

Mundane items such as door locks require replacement too. The door lock might look like it TAN

Se

Maintaining Your System

works fine, but every time you use the key to open the door, the lock cylinders wear a little bit. After an extended time , the cylinders wear enough that the lock might not work as anticipated.

An intruder might find that more than one key will open the door because the lock cylinders are worn. Generally, you'll want to replace exterior door locks every five years unless the vendor provides an extended warranty for a longer period. The sun can become your worst enemy when working with security system. For example, the window sensors that you depend upon rely on a plastic case and means for attaching the sensor to the window. The sun damages the plastic, and eventually the case will physically fail; it will

crack or experience other problems. You need to inspect anything with a plastic (or other material easily damaged by sunlight) case regularly and replace the device when the plastic becomes stressed, even if the device itself works fine. Anything that relies on a chemical reaction (smoke detector) or involves a physical movement

(door locks) is subject to wear and therefore requires replacement. Even though this section doesn’t include specifics on every security device out there, you want to make sure you replace these devices regularly. Otherwise, Murphy's Law will take effect and a failure will occur at the

worst possible moment. (For a bit of fun, see the complete list of Murphy's Laws at http:// dmawww.epfl.ch/roso.mosaic/dm/murphy. html.)

CLEANING THE SYSTEM

Every part of your security system requires cleaning. Although many people would immediately clean the outside of the window sensors simply because they’re next to a window that they’re also cleaning, you must clean every other component too. However, cleaning doesn’t really describe

the task completely. When you clean a security system component, you also:

e Physically inspect the unit, looking for signs of tampering or wear and tear. ¢ Check the expiration date of any detectors that include time-sensitive parts, such as smoke detectors. ¢ Look for signs of deterioration such as a white residue on plastics and corrosion on metals.

You'll need a few pieces of equipment to clean the security system. None of these items are exotic, but you might want to keep them in their own box. Here’s the list of items this section uSES:

213

Chapter 8eee ene CACC onsesnsnsnssce ECC vunseenesanemses cn rnenenoenarseururunenaranerrcere evennrneenesesec re

Chief Greg Hahn is the head of the La Valle (Wisconsin) Fire Department. He has been with the department since October 1982 and is currently both a firefighter and a first responder. The

La Valle Fire Department is all volunteer and is celebrating one hundred years of service in 2005. Like all firefighters, Greg knows the importance of good maintenance all too well. Too many homes have smoke detectors that don’t work, resulting in significant losses every year, not just to property but also to human

lives. Photograph used by permission of Greg Hahn.

Q.

What are the personal safety benefits of getting a home security system with fire or other forms of emergency detection installed?

A.

You're not always aware of what's happening all around the house, so something could happen at the other end of the house and your security system would let you know what's going on. Maybe you're not even at home, and it would make the necessary phone calls to

save your personal property. Q.

What kinds of monitoring do you suggest people get (fire, carbon monoxide, radon gas,

flooding, and other}? A.

A fire alarm is probably the better one, but carbon monoxide is becoming more popular. In our small community, we get about six calls a year for carbon monoxide poisoning, and three of them this year were serious. [Editor's note: La Valle is a very small community of

about 446 people, so six calls a year is a high number.] When | say serious, | mean we took these individuals to the hospital, and it’s a long process to get that carbon monoxide out of their system—two or three days. They get violently sick, and they don't even realize they're getting sick because you can’t smell it or see it. As far as radon detectors are concerned, in some areas, they're very important, but in other areas, they're not.

Q.

Are there particular benefits of installing a centralized monitoring system for someone with a home office?

A.

Yes; we've had problem in our community where people put alarm systems in and they live in Chicago. It’s nice if they have an alarm system that this alarm system notifies before it

214

calls 911. The reasoning is that a lot of times it’s just a [faulty] sensor or something and it _ can be detected by the company that installed the alarm system, or the person who receives the alarm can look over and see if it's a real fire. It’s something that Sauk County requires. If you have an alarm system, you can’t just set it up to call 911. They want it to

call a person first, and then have that person call 911. Do home security systems with monitoring work well for people who live in remote or

secluded areas? . Yes, just because a lot of them don’t have people to watch their homes. Out here, a big part of the vacation homes are seasonal. Without some sort of alarm system, it’s hard to watch the homes. They've got them set up so they can call on the phone and the system will tell

them whether it’s too hot or too cold, along with other information, right over the phone. Do you recommend a whole-house solution, or do you prefer to see solutions that empha_ size particular areas? We recommend one fire detector on each floor of the home, and now we recommend one

in each bedroom. This is something that’s brand-new. Up until a year ago, we recom-

_mended one on each floor of the home. And we want them integrated so that when one _goes off, all the others go off too. A lot of older homes don't have integrated smoke detectors. A lot of them have just battery smoke detectors. We have a program here for families that can't afford smoke detectors. When we find out about it, we have battery ones and we'll put them in for them. That's

better than nothing, because smoke detectors do save lives. How many and what type of detectors do you recommend?

If a person can afford it, it’s better to target different areas with the right kind of sensor. If you can't afford it, anything is better than nothing. Each house is different; it’s better to put a rise of heat type in an area with a fireplace or woodstove. Smoke detectors are also likely to go off in areas with cooking [so you might want to use a rise of heat detector in the

kitchen as well]. Which home security system add-ons do you like to see for the elderly, if any?

The older people get, the more they need. A lot of them wear the panic buttons. We have - about twenty in our community who have them. There are accidents where the buttons go off by accident, but we treat them as if they're the real thing until we find out otherwise. Which home security monitoring solutions do you find work best? We recommend using separate smoke and carbon monoxide detectors, rather than the

215

Chapter 8 A

Pi

al

Ge

et

a

oe

ee

dual units. The dual units look just like any smoke detector, just the standard round unit. They'll go off and you don’t know why. You don’t know what the carbon monoxide level is in

the home because you can't see it or smell it. The carbon monoxide detectors with the digital readout are important. They'll give you a tag to tell you what the stages are and how they'll affect your body. When the combination units go off, we llgo out with our sensor and we can’t really tell what it was set at or why it went off. If you have a digital readout, the homeowner can tell us what the carbon monoxide level was when it went off, and we can either confirm it or investigate what the problem was. Q.

Do some home security system features [such as bars on windows] prove more of a hindrance than a help?

A.

The only hindrance is operating the window for the homeowner. We've never had a fire where we couldn't get in to save someone. We have equipment to handle just about any-

thing. Short of a brick wall, we can handle anything. | think the newer bars with the latch are better. If you have little kids, they might not be able to get out even with a latch on them. We tell the kids, have two ways out and then have a meeting place when you get out.

Q.

Do firefighters prefer to see professionally installed systems over do-it-yourself solutions, and why?

A.

| don't know if it makes a difference, as long it’s put in correctly and will operate after-

wards. lf the individual will do their own testing, that’s the main thing. Do-it-yourselfers can do it just as well. These systems aren't that complicated.

Q.

Do you feel that home security solutions should also include personal assistance [for example, someone falls and uses a call button to receive help}?

A.

Yes. It’s always nice if you have help. Especially in the time of need, just an extra person is helpful. Even if they're on the telephone line or anything, if you listen to 911 programs, the

dispatcher will stay on the phone just to comfort them until someone comes to [assist] them. That’s why the OnStar program for cars is so popular. Someone’s there to be with them until help arrives. Q.

Do you answer many false alarms from monitoring equipment? Is there any pattern to

A.

these false alarms (such as people who live in this area only part of the year)? No patterns. We do answer quite a few false alarms each year—somewhere about 10 percent due to alarm systems.

Q.

A.

216

What additional items would you suggest the homeowner add to the house? lt would be good to have a sprinkler system, at least around the furnace area, the fire-

ee

Maintaining Your System

place,ae the kiehen If it’s an older house, you can still put it in your basement around the furnace. The systems are relatively inexpensive. Even the plastic products will stand the temperatures ane won't melt before they go off, so they're easy to run wherever you.

need them. Most homes also don't have fire extinguishers. It’s a good item to have, but most people don't even think about them.

¢ One-inch paintbrush, preferably with natural bristles (so they won't scratch)

¢ Dust cloth (completely dry)

e Wash cloth (moist, not wet)

¢ Bucket of water with mild detergent solution

¢ Isopropyl (easy to get) or methyl (preferred) alcohol ¢ Electrical cleaning swabs (look like long Q-tips but with wooden sticks) -@

Lens cleaner

* Optical-quality lens wipes ‘e Tool kit (screwdrivers, small wrench set, pliers, and other tools as needed)

e Stepladder O

Compressed air for computers

and/or electronics

Now that you have everything you need, it’s time to start cleaning. The following sections describe how to clean various security system components. If you don’t see an entry for your specific device, choose a device like it. For example, a radon or carbon monoxide detector will require the same cleaning process as a smoke detector.

Glass Break (Audible Type), Radon, Carbon Monoxide, Rise of Heat, and Smoke Detectors

Most vendors seal these detectors, so you don’t have to worry about opening them up. However, since they are open to the air, you have to get dust out of the inside. The important consideration for these devices is not to get them wet. Use a damp cloth, not a dripping one. Use the following steps to clean these devices. 1. Carefully wipe the exterior of the unit using a damp cloth. Immediately dry the exterior

using a dry cloth. 217

2. Remove the unit from the wall or ceiling. Most units unscrew or require a simple twist for removal. Brush any dust from the back of the unit using the paintbrush. Blow any dust from the inside of the unit using the compressed air. Clean any exposed contacts using an alcohol-moistened swab. Inspect the unit for damage. Place the unit back on the wall or ceiling mount. Se See Motion Sensors

Vendors use a number of construction techniques for interior and exterior motion sensors. When you encounter a sealed unit—one that lacks screws, clips, or other means of internal access—all

you need to do is clean the outside of the unit with a damp cloth (avoiding the lens) and clean the lens with lens cleaner and an optical-quality lens cloth. The sealed units still get dirty in the

inside and fail faster because you can’t clean them. All of the unit types require a little more work. Use the following procedure for any motion sensor that provides access. 1. Clean the exterior of the motion detector (except the lens) using the damp cloth. Don’t touch the lens with the damp cloth; you could scratch it.

2. Remove the front cover from the unit. You might have to undo a screw to perform this task. 3. Carefully remove the lens, if possible, and set it aside. It helps to have a helper to do

this because you normally need to stand on a stepladder to gain access to the motion detector. 4, Use compressed air or the paintbrush to remove dust and debris (such as insects) from

the inside of the unit. Use extreme care not to dislodge any switches or jumpers. Be careful not to trip the tamper spring. 5. Clean the lens using lens cleaner and the optical-quality lens cloth. Replace the lens in the motion detector. 6. Replace the front cover on the unit.

Glass Break Sensor (Shock Type) This procedure only applies to shock-type glass break sensors that include a separate box that

mounts to the window. (Clean tape glass break sensors as part of cleaning the window.) The following procedure shows how easy it is to clean this device. 218

Maintaining Your System

Clean the exterior of the glass break detector using the damp cloth. Remove the glass break detector cover. Clean the inside of the unit using the paintbrush or compressed air. Replace the cover. Clean exposed contacts (if any) with alcohol and swabs. Ste Oa Door and Window Sensors

Vendors generally seal door and window sensors, so you can’t clean the inside. All you need to do is wipe the outside of the sensor with a damp cloth and clean any exposed contacts using an alcohol-moistened swab. Make sure you clean both the sensor and the magnet. Keypads, Panic Buttons, and Other Input Devices

In most cases, vendors seal these units and include a number of tamper devices inside, so you probably won't want to open them even if you can. When the keys begin to stick or provide intermittent contact, replace the unit rather than cleaning it. To clean the unit, blow any dust out of

crevices using compressed air. Wipe the outside of the unit with the damp cloth.

Alarm (Bell) Box The bell box doesn’t require much in the way of cleaning, but you should clean and inspect it every time you work on the rest of the security system. Because the bell box emits a loud noise, you might want to wear hearing protection while cleaning it. Here are the steps for cleaning the bell box. Clean the outside of the unit with the damp cloth.

Open the front of the unit. Clean the inside of the unit with compressed air or the paintbrush.

Clean any exposed contacts using alcohol and a swab. Close the front of the unit. dba aed a ame Displays and Monitors

Monitors and displays, especially the cathode ray tube (CRT) variety, are dust magnets. You might want to clean these units more often than the rest of the security system. In fact, cleaning

them once a week isn’t too often. Always turn the unit off and let it sit for a while (about an hour) Z19

Chapter 8

before you clean it. The dust on the front of the display or monitor can build up a static charge. Although this charge won't kill you, it can deliver a painful shock. Here are the steps for cleaning a monitor or display.

1. Use compressed air to blow any dust out of switches or adjustment knobs on the unit. Make sure you check the back of the unit as well as the front.

2. Blow any dust out of the inside of the unit using the compressed air. A vacuum with a plastic nozzle can also help in this case. Don’t open the unit unless you have the required training; it contains high voltages that can cause physical harm or even death.

Make sure you clean the unit thoroughly to promote good air circulation and reduce the risk of fire.

3. Clean the outside of the unit with a damp (not dripping) cloth. Be especially careful not

to get any water inside the unit. 4. Clean the front of the display or monitor with lens cleaner and an optical-quality cloth.

You can reduce the amount of dust that the monitor or display collects by using a special static-reducing cloth designed especially for the purpose. Computer cleaning cloths work especially well here. 5. Make sure the unit is completely dry and turn it on. Adjust the color, brightness, and

contrast for a good picture. Central Control Panel

Unlike every other component in the security system, the central control panel constantly receives power from two sources: the house main and the battery. If you disconnect these power sources, you'll need to reenter all of the information for your security system, so many people

choose not to disconnect the power. Make sure you use the one-hand rule when working with

this unit: never touch the unit with both hands even if you think it’s safe to do so. Use the following steps to clean the central control panel. 1. Clean the outside of the unit using the dust cloth. Avoid using water, even a damp cloth,

anywhere around the unit. If necessary, you can remove stubborn dirt using a damp cloth, but exercise extreme care.

2. Open the front panel.

3. Use compressed air to clean the inside of the unit. Never use a paintbrush or anything with metal to clean the inside of the unit; you could get shocked or short out the unit. 4. Close the front panel. 220

ae

Maintaining Your System

Make sure you double-check the vendor manual for point, tilt, and zoom

(PTZ) cam-

eras. These cameras may require lubrication or special cleaning for the PTZ component. Unfortunately, since there are so many different mechanisms, there isn’t a generic cleaning and lubrication procedure to use for the PTZ element of these cameras.

Camera Enclosures

Generally, you don’t want to attempt to clean the inside of a camera yourself, unless you have the

specialized knowledge and tools for the task. However, you do want to keep the outside of the camera clean and you want to clean the camera enclosure. The following steps will get you started cleaning your cameras. 1. Clean the exterior of the camera enclosure (except the front of the enclosure, the camera port, where the camera lens points out) using the damp cloth. Don’t touch the camera port with the damp cloth; you could scratch it.

2. Remove the top (or other opening) from the camera enclosure. In most cases, you'll

have to undo a screw to perform this task. 3. Carefully undo the camera connections. Remove the camera from the enclosure and

place it in a safe location. It helps to have a helper to perform this task because you normally need to stand on a stepladder to gain access to the camera enclosure. 4. Remove the camera port and place it in a safe location (again, it pays to have a helper). 5. Clean the inside of the camera enclosure using the damp cloth, paintbrush, dust cloth,

and compressed air as necessary. Make certain that you remove bugs from the inside of the enclosure and check for damage to the camera cables. 6. Clean the camera port by using the compressed air to remove any dust; then use the

lens cleaner and optical-quality lens cloth to remove any remaining smudges or dust. Replace the camera port into the camera enclosure. 7. Clean the exterior of the camera (except the camera lens) using a combination of com-

pressed air and the damp (not dripping) cloth. Use the dry cloth to dry the camera immediately after you clean it. 8. Clean the camera lens by using the compressed air to remove any dust and then using the lens cleaner and optical-quality lens cloth to remove any remaining smudges or dust. Replace the camera into the camera enclosure and reconnect the cables. 221

Chapter 8

9. Replace the top (or other opening) onto the camera enclosure. 10. Test the camera and realign it as necessary.

PERFORMING RANDOM TESTING

After you clean the security system, you should test it. You might also want to test the security system after a storm (to ensure nothing was hit by lightning), after a security event, or simply

because you want to ensure that the security system continues to work as anticipated. Random

testing is an important part of the maintenance cycle. Chapter 6 contains complete details on testing your security system.

In addition to electronic testing, you should perform a physical inspection and test of your security system. In fact, you should create a checklist of items to inspect based on your home and its environment. Here are a few ideas to consider.

¢ Prune tree branches that are too close to windows. Long tree branches could allow an intruder to access a second-floor window. ¢ Cut back any overgrown branches that could cause motion detectors to go off. ¢ Verify that plantings and other items don’t obscure the view of security cameras or provide an opportunity for an intruder to hide from the camera. ¢ Look for wood rot or other problems such as loose concrete. Decaying infrastructure could weaken latches, loosen sensor connections, and cause other problems.

According to Officer Tom Peters (see his interview in chapter 3}, “It’s important to check the exterior of a home for obvious locations to enter.

A good walk around a

home can locate coal chutes [in older homes], air conditioners, basement doors, heating and cooling vents, and roof access points. These items should be taken into consideration when designing a home or commercial security system. Rooflines sometimes can lead to second-story bedroom windows and be easy access points, too.” Make sure you perform this check at intervals because the exterior of your home and environmental conditions change. A tree that was too small to climb to reach a second-story window last year might be large enough this year. een

feds

a

eee

Maintaining Your System

Check for changes in landscaping materials or roofing/siding materials that might expose hidden wires that affect the security system. Exposed wires could allow the intruder to cut wires, enable animals to chew through them, allow water damage of wiring or sensors, or cause other problems. ¢ Inspect the crawl space (if applicable) to determine if someone has tampered with home

security wiring. You'll also want to check the physical security of crawl spaces to reduce the chance of someone getting inside your home unobserved.

¢ Inspect your attic for any signs of forced entry, cut wires, or other security-related problems.

¢ Prune any vines or bushy plants. Such plants can make it easy for intruders to hide from view. ¢ Remove any objects in the yard. An intruder can use large branches, chairs, stray ladders,

and other items to break a window, climb to a higher floor, or cause other problems with

your home security system.. ¢ Check the alignment of all your sensors (as needed) including motion detectors and cam-

. eras.

‘e Verify that every sensor has a good connection to the house and replace any missing screws or defective adhesive.

UPDATING YoUR EQUIPMENT A security system isn't a toaster, a refrigerator, or even a television. You can buy any of these items

and reasonably expect that the purchase is the end of your financial commitment, and you can

use the device until it no longer functions or provides reasonable service. Security systems contain many discrete components, all of which wear out at some point. In addition, security systems

provide add-on capability and vendors are always producing the next new security innovation. Consequently, even though you start by buying the entire security system, you also have a continuous update process to consider. The following sections discuss update issues for various security system elements.

Security System

Generally, you'll buy a security system one time. You'll replace security system elements, but you won't buy the entire security system again unless certain events happen. The most common event 223

Chapter 8

is that the security system has too little add-on capacity. It’s easy to start out thinking that you'll never want anything more than two door sensors and a motion detector. If you live in a one-bedroom upstairs apartment for the rest of your life, you may very well be right. Realistically, however, you'll eventually add something to your security system. When your security system no longer provides expansion capability and the attached devices are old enough that a new central control panel won't support them, you might find yourself replacing the entire system.

The advance of technology also presents a problem for security systems. As vendors find new

ways to keep you safe, you might find that your old system won't accommodate your security requirements. Good maintenance practices generally keep this kind of replacement at bay, but it

does happen. The entire security system ages, and new advances make the equipment outdated

enough that an entire system replacement becomes practical and quite appealing. Security systems can also experience systemwide damage. Although you can keep damage to a

minimum by adding an uninterruptible power supply to your setup, systemwide damage still occurs. A lightning strike in the right location can impair your entire security system and make it unusable.

Physical Components

The “Equipment Replacement” section of the chapter describes many of the conditions under

which you replace physical components. For example, any sensor that relies on a chemical reaction, such as an ionizing smoke, carbon monoxide, or radon detector requires regular replace-

ment because the sensor becomes insensitive over time. Keypads wear out as you use them, as do door locks. Some physical components wear out for other reasons. For example, the sun oxidizes plastic, making it brittle and prone to cracking. Metal corrodes as water seeps under paint.

Aging isn’t the only enemy that you must consider. Physical components also become less acceptable for other reasons. Technology often makes a newer device seem better and more reliable. You might replace magnetic door and window sensors with another technology at some point. Self-powered devices are becoming more pepular as energy becomes more expensive. For example, many shock-type glass break sensors rely on a piezoelectric crystal to produce the power required to signal an alarm. Flashlights containing magnets can replace ones with batteries, at

least for short-duration use. Solar-powered path and doorway lighting is becoming quite popular. A technology innovation could make your current sensors obsolete in a way that makes an update not only necessary but also desirable. 224

Maintaining Your System

You will replace some equipment for other reasons. A vendor might find that an older model of a device gives the intruder too much of an advantage and request that you update the device to one that provides better security. You might buy another product and find that the security system component interferes with it. In many cases, you have to either replace the security system component or live without the new device. When the new device provides some type of health or safety feature, the need to update the security system becomes obvious. As you learn more about your security system, you may find you want to update devices. People generally find that the security system they thought would do everything needed really doesn’t. The ability to add a new feature is important for a security system because you never know what new item will become desirable tomorrow. Cabling

Cabling, the connections between pieces of equipment, is an important part of the security system. Without good cabling, it doesn’t matter how many great devices and sensors you buy when you choose a hardwired setup. Cables are prone to all kinds of problems. Animals chew through cables, the environment rots them, and water gets inside them. Cabling problems can take numerous forms, many of which are hard to troubleshoot. See “Physical Connectivity” in chapter 6 for additional details about diagnosing cabling problems. You'll need to update cables whenever a new technology makes it possible to improve the overall reliability of this important security system element. Software

Sometimes you need to update software on your security system. Unfortunately, you probably won't hear about the updates, and if you do, you'll find that the update procedure can become a little complicated. The first step is to check the status of your security equipment. Go to the vendor Web site on the Internet, search for the model number of the device, and determine whether it requires any software update. Sometimes this method fails, however, because the vendor goes out of business or the updates appear on a maintenance Web site. When you finish looking on the vendor Web site, use a Web search service, such as Google (www.google.com), to locate

information about your particular device. Simply use the model number as the search criterion. When your equipment does require an upgrade, make sure you download any software from the vendor Web site. Sometimes the vendor Web site will contain complete instructions on imple225

Chapter 8

ene,

menting the upgrade, such as the instructions found on the GE Web site at www.geindustrial .com/ge-interlogix/support/technical/recall/alarm_notice_zx.html. If you don’t find detailed instructions on the vendor's site, check for a README

or other informational file supplied with

the software. If you don’t find installation instructions in either location, call the vendor's support number to determine whether the instructions exist. In some cases, you have to have a vendor

representative install the software update. Make sure you learn about any hidden costs before asking the vendor to send someone to install the update.

After the installation, be sure to test your security system completely to ensure it works as antici-

pated. You might need to update or change security settings before you perform the test; check the device to verify it has the correct settings. Chapter 6 tells you all about security system testing. Environment

Many people don’t think about the security system environment at all when it comes to updates, yet the environment

is the basis for many security system assumptions.

For example, providing

better humidity control in your house can reduce contact corrosion on security system components. A better dust filtering system not only keeps allergies at bay but also reduces the need to open every security device and clean it. Providing the correct sun filtering can reduce damage to plastic parts. In short, the environmental factors that affect you also affect the security system. However, the environment includes more than environmental factors. An old window might not provide a secure base for a window sensor. As a result, the window sensor may generate false alarms

or may not react as it should when the time comes. A crumbling brick wall doesn’t provide a very suitable base for a camera, but it might be all you have. A rotting door frame doesn’t provide a good basis for a long-throw dead bolt. All of these environmental factors also require updates. Keeping

your house in good shape also provides a good basis for security system components. A particularly difficult problem for anyone living in a colder climate is ice—it ends up getting everywhere during the winter season. Ice dams, in particular, can cause a wealth of problems with any security component that is placed outside. An ice dam subverts the roof and can cause water to come out of the soffit, rather than flow to the edge of the roof as normal. The resulting

mess can affect cameras quite easily and can also affect outdoor keypads and other security ele-

ments. Make sure you add proper technologies to your house to avert ice dams and other weather-related damage. For example, running a simple heater cord along the edge of the roof

and within the gutters can keep ice dams at bay. 226

as

Maintaining Your System

DIAGNOSING POTENTIAL PROBLEMS

This entire book has provided you with troubleshooting tips. In fact, you'll find many troubleshooting tips in chapter 6 as part of the testing solutions and in chapter 7 as part of the automation solutions. Generally, you'll find troubleshooting tips with the material that describes

the particular security system element. However, some elements require additional description or elaboration. The following sections contain troubleshooting tips that haven’t appeared in other parts of the book. Window or Door Sensors

The “Window and Door” section of chapter 4 includes an illustration of a window or door sen-

sor (figure 4-3). This section also describes the general operation of these simple devices. Despite their simplicity, window and door sensors can experience a number of problems that you might not diagnose easily. One security expert related a story about a homeowner who claimed that the door and window sensors didn’t work in the morning but did in the afternoon. The homeowner generated a number of false alarms in the afternoon after opening the window in the

morning and forgetting to turn the alarm in the zone off. It turned out that moisture in the sensor caused the device to stick in the morning. The sun heated the device in the afternoon, allow-

ing it to work as normal and setting off the alarm. Always replace sticking window and door

sensors. Incorrect placement of the sensor or associated magnet can also cause problems. For example, a

loose sensor or magnet could cause intermittent problems. Closing the window or door one day

lets the sensor reset because the component is in the right place, but not the next day if the sensor shifts position. This problem can also create numerous false alarms. A truck passing by the house can set the alarm off by shaking the affected component into a new position. Flood Sensor

Flood sensors work by detecting water—any water. The source of the water doesn’t matter; it could some from anywhere. Consequently, the flood sensor can go off even when there isn’t a flood and the flood sensor is working normally. Consider the Shark Tank article at www.comput erworld.com/departments/opinions/ sharktank/0,4885,100479,00.html?source=NLT_SH&nid=1 00479. In this case, the alarm went off because someone came in from outside with snow on his

shoes. The story is amazing when you consider how easily this situation could happen to anyone. 2a

Chapter 8

The author of the story fixes the problem by having the technician stomp his feet prior to entering the building. However, choosing a better location for the flood sensor would also work. The lesson behind this problem is that you shouldn't assume a flooding sensor is faulty simply because it creates an alarm at an unexpected time. Look for unexpected water sources as part of your flood sensor diagnostic.

Let’s START SECURING This chapter has described the paperwork trail you should create for yourself as you maintain

your security system. Maintaining proper paperwork helps everyone. The chapter has also demonstrated the need for using the correct cleaning, testing, and replacement techniques. All security equipment requires some cleaning. The amount of cleaning you'll actually perform depends on what your monitoring company provides; most don’t provide any help at all in this

area. Monitoring companies can help you with the testing requirements for your security system. You'll have to either replace old security equipment yourself or rely on a third-party security vendor to do it. Now it’s time for you to take action. Begin by performing an inventory of every device in your

security system and using the inventory to create a maintenance plan. Check the vendor documentation for recommended cleaning procedures. If the vendor documentation lacks proper cleaning, testing, and replacement procedures, rely on the techniques described in this chapter.

The point is to maintain an awareness of your security system and its status to ensure that the alarm will actually sound when you need it to protect something. Congratulations! You’ve made it to the last chapter of the book. However, the adventure still isn’t

quite complete. The appendixes contain a wealth of additional information. Appendix A contains a list of security vendors and describes the major items they sell. This list isn’t complete and I’m not making any recommendations. View this appendix as a starting point. Appendix B contains

fifty-two tips that will make your security system work harder for you. It points out some of the most common problems that various professionals have described as I interviewed them for the

book. Appendix C contains a list of standards that you should know about. Standards are an important part of designing a security system because they help you ensure that your security system meets requirements that experts have determined, through testing, experimentation, and experience, that a security system should meet.

228

APPENDIX A: HOME SECURITY VENDORS

This appendix contains a list of home security vendors. I don’t mean this appendix to be a comprehensive list, and P’'m not endorsing these particular vendors. This list will help you get started, but I encourage you to visit other vendor Web sites as well. It’s amazing to see some of the security products available today. Most of these vendors appear somewhere in the book. A few others popped up while I researched various book topics. If you find a particularly helpful vendor, please let me know about it. You can contact me at [email protected]. A&E Security Company (www.aesecurity.com)

This company sells complete security systems and monitoring services. The security systems are oriented toward the needs of the do-it-yourself homeowner who wants a packaged solution. This company appears in chapter 1. In addition to the Web site, you can contact A&E Security Company at PO Box 12294

Silver Spring, MD 20908 Phone: +1 800-889-4471 or +1 301-598-0615 Fax: +1 301-598-1269

E-mail: [email protected] 229

All of the products discussed

in this book are available from

multiple vendors.

Comparison shopping can save you considerable money in putting your security system together. Of course, the difficulty is finding the vendors. Using Froogle.com (http:// froogle.google.com) can help you locate vendors for a specific product faster and with greater accuracy than using a standard Web site search engine.

ADT (www.adt.com)

This vendor provides complete home security solutions including installation and monitoring. You can contact this company for complete security services that don’t require a lot of work on your part. This company appears in chapters 1, 2, and 3. In addition to the Web site, you can contact ADT at

Phone: +1 866-SHOP-ADT (residential) or +1 888-238-7090 (small business) Alarm Relay (www.alarmrelay.com)

This is a service vendor that provides alarm system monitoring. One of the special features of this company is that it provides support for the home hobbyist, making it a good option for the do-it-

yourselfer who wants additional support. This company appears in chapter 2. In addition to the

Web site, you can contact Alarm Relay at 111 South Marshall Avenue E] Cajon, CA 92020 Phone: +1 800-624-6866 Fax: +1 619-442-7171

E-mail: [email protected] Alarms Unlimited (www.alarmsunlimited.com)

This vendor provides a mix of packaged security systems (installation and monitoring included) and security system add-ons. For example, you can buy a basic security system package and add a CCTV setup to it. Besides home security, this vendor also provides home entertainment setups

and other home add-ons such as intercom systems. This company appears in chapter 2. In addition to the Web site, you can contact Alarms Unlimited at 230

eee ome

Security Vendors

6501 N. Lincoln Avenue Lincolnwood, IL 60712 Phone: +1 847-410-0000 Fax: +1 847-410-0010

All Secure Safety.com (http://members.shaw.ca/securesafety] This is a service-oriented company. You'll find various insurance resources for nonstandard insur-

ance needs. The Web page also includes entries for personal protection, computer safety, and outdoor safety. This company appears in chapter 1.

All Things Digital (www.youdoitsecurity.com)

This company provides a wide range of security products. You can obtain both individual components and complete systems. For example, if you want to set up a four-camera system that you can view with a single monitor, you can obtain the complete system as a single package from this

company. All Things Digital is also one of a number of sources for complete perimeter systems. This company appears in chapter 1. In addition to the Web site, you can contact All Things Digital at

.

7213 NW 54th Street Miami, FL 33166 Phone: +1 888-297-9506 or +1 305-887-9464 Fax: +1 305-887-9468

E-mail: Sales@allthingsdigital. net Allsop Incorporated (www.allsopgarden.com)

This vendor mainly provides gardening supplies. However, it also offers a number of interesting path-lighting products, including several solar-powered options that you can use to improve security and safety around the home. This company appears in chapter 4. In addition to the Web site, you can contact Alsop at PO Box 23

Bellingham, WA 98227 Phone: +1 360-734-9090 or +1 800-426-4303 Fax: +1 360-734-9858

E-mail: [email protected] 231

Appendix A

American Alarm (www.americanalarm.com)

This service vendor provides packaged alarm system installation and monitoring. In addition, the company’s on-call! technical support staff can help you overcome security system problems or check the status of an alarm. This company appears in chapter 2. In addition to the Web site, you can contact American

Alarm at

Phone: +1 800-792-5142 or +1 781-641-2000 B&A Products (www.baproducts.com)

This is a family-run business. You'll find a number of interesting products on the Web site including alarm electronics, emergency preparedness products, and first responder supplies. The electronics supplies are much as you would expect from any vendor. The emergency preparedness products include everything from watertight boxes to solar-powered backup energy. First responder supplies include emergency medical kits and other personal-care items. This company appears in chapter 4. In addition to the Web site, you can contact B&A Products at Route 1 Box 100 Bunch, OK 74931-9705 Phone: +1 918-696-5998 Fax: +1 918-696-5999

E-mail: [email protected] Bass Home Electronics (www.basshome.com)

This vendor provides a range of home security systems including dedicated fire alarm systems. You'll also find a number of reporting solutions including standard alarm monitoring, cellular telephones, and automatic dialers. In addition to packaged alarm systems, this vendor can sell you standard and exotic alarm components, including specialty smoke detectors and home automation components. This company appears in chapters 4 and 6. In addition to the Web site, you can contact Bass Home Electronics at

2291 Pine View Circle Sarasota,

FL 34231

Phone: +1 877-722-8900 or +1 866-718-7583 or +1 941-925-9747 or +1 941-5271473 Fax: +1 941-870-4156 232

ee

ee

Home Security Vendors

Bits ’n Bores.com (www.bitsnbores.com)

This vendor specializes in boring tools of every type imaginable. You can find drill bits for boring through just about any material, which makes installing your security system significantly easier. This company appears in chapter 5. In addition to the Web site, you can contact Bits ’n

Bores.com at 991 Victory Highway Coventry, RI 02816

Phone: +1 401-623-1677

E-mail: [email protected]

Brinks (www.brinkshomesecurity.com)

This vendor provides a number of packaged security solutions and monitoring services. One of the unique features of the security systems that this company installs is that they rely on wired sensors rather than the wireless sensors most packaged-solution companies offer. This company appears in chapter 2. In addition to the Web site, you can contact Brinks at Phone: +1 800-725-3537

Camera Superstore (www.camerasuperstore.com) This vendor specializes in affordable cameras and camera equipment, including a full line of installation products. For example, you can find a number of standard and unusual camera enclo-

sures on this Web site. This company appears in chapter 5 . In addition to the Web site, you can contact Camera Superstore at

3755 E 34th Street Suite #101-A Tucson, AZ 85713

Phone: +1 888-376-2288 or +1 520-790-2410 Fax: +1 520-790-9216 E-mail: [email protected] Cepco Products (www.cepcoproducts.com]

This vendor specializes in power line equipment. The advantage of these devices is that they use existing house wiring to transfer information to and from the security system. The vendor pro233

vides all of the standard security devices, including specialty sensors such as flood detectors. This

company appears in chapter 5. In addition to the Web site, you can contact Cepco Products at 9540 Owensmouth Avenue Unit #3 Chatsworth, CA 91311

Phone: +1 818-998-8569 Fax: +1 818-998-8560 E-mail: [email protected] Cheap Swimming Pool Products (www.cheappoolproducts.com) This vendor sells a wealth of pool supplies.

From a home security perspective, the most impor-

tant items are the pool monitors and alarms. This company appears in chapter 3. In addition to

the Web site, you can contact Cheap Swimming Pool Products at Phone: +1 800-990-8595

Fax: +1 800-591-6709

E-mail: [email protected]

Circuit Cellar Magazine (www.circuitcellar.com)

This magazine is for the do-it-yourselfer who wants to build security equipment from scratch. Every magazine contains embedded system development ideas that can turn your dream project into a reality. Project references from this magazine appear in chapters 4, 5, and 8. In addition to the Web site, you can contact Circuit Cellar magazine at: 4 Park Street Vernon, CT 06066

Phone: +1 860-875-2199

CornerHardware.com

(www.cornerhardware.com)

This vendor carries everything you would expect to find in a well-stocked hardware store. The home security products include devices for installing security cable, junction boxes, and everything you need from a hardware perspective to install your security system. This company

appears in chapter 5. In addition to the Web site, you can contact CornerHardware.com at: 234

Se

ee

Home Security Vendors

10620 NE 8th Street Suite 201

Bellevue, WA 98004 E-mail: [email protected]

D-Link (www.dlink.com) This vendor specializes in personal computer-based systems. You can find both hardware and

software for your security system. In addition, you can find generic enclosures for cameras and other useful security system hardware. This company appears in chapter 5. In addition to the Web site, you can contact D-Link at 17595 Mt. Herrmann Fountain Valley, CA 92708 Phone: +1 800-326-1688 E-mail: [email protected] eAlarmscreens.com (www.ealarmscreens.com) This vendor specializes in sensor screens for the home that detect a break-in through a screened

window or door. This company appears in chapter 4. In addition to the Web site, you can contact eAlarmscreens.com at:

260 Redwood Way Goleta, CA 93117

Phone: +1 805-968-8303 Fax: +1 805-968-3563

EC&M Magazine (www.ecmweb.com) This magazine provides a vast array of information about electrical tools, technologies, and prin-

ciples, including those used to install electrical cabling in a home. You'll also find great information about current National Electrical Code requirements. This magazine appears in chapter 5. In addition to the Web site, you can contact EC&M

at

Phone: +1 913-341-1300

E-mail: [email protected] 239

Appendix A

Elk Products (www.elkproducts.com) This vendor specializes in home security hardware and provides some home automation hardware as well. Many of the solutions rely on X10 networks, but you can find other technologies on

the Web site as well. Some of the more interesting offerings include specialized panic buttons

and alternative doorbell/telephone sensors for those with special needs. This company appears in chapter 4. In addition to the Web site, you can contact Elk Products at PO Box 100

Hildebran, NC 28637 Phone: +1 800-797-9355 or +1 828-397-4200 Fax: +1 828-397-4415

E-mail: [email protected] Ferret.com (www.ferret.com.au) This vendor sells products from a wide range of companies for almost any purpose you can imag-

ine. The focal point for this book is the health and safety offerings. For example, you can find detectors that will let someone with special needs know in advance about harmful devices such as cellular telephones. This company appears in chapter 4.

Firehouse.com (www.firehouse.com) This vendor specializes in firefighting equipment of all types, including professional equipment. One of the more interesting features of the Web site is the vast array of firefighting information that you can download appears

for free to learn more

about protecting your home.

This company

in chapter 4,

Fred Behnken’s Personal Security Consulting (www.nmpistoltraining.com)

This company provides various types of personal security training. You can learn everything from how to carry a concealed handgun (legally in New Mexico) to Aikijutsu (martial arts). This company appears in chapter 1. In addition to the Web site, you can contact Fred Behnken’s Personal Security Consulting at

Phone: +1 505-254-7550 236

Home Security Vendors

Glolab Corporation (www.glolab.com)

This vendor specializes in kits for the do-it-yourselfer. The kits come complete with everything needed to build a security device, including instructions. This vendor represents a halfway point for do-it-yourselfers who want to use something better than off-the-shelf components but don’t want to build a project from scratch. This company appears in chapter 4. In addition to the Web site, you can contact Glolab Corporation at

307 Pine Ridge Drive Wappingers Falls, NY 12590 Phone: +1 845-297-9771 Fax: +1 845-297-9772

E-mail: [email protected]

H&B Security Center (www.hbsecurity.com)

This company sells a range of security products that include security systems and physical security. For example, it provides locksmith services and sells window film to make your windows harder to break. You can also obtain security components as diverse as safes, intercoms, and air

quality control (using the Nutone system). This company appears in chapter 3. In addition to the Web site, you can contact H&B

Security Center at

274 Highland Road West Kitchener, Ontario, Canada N2M 3C5 Phone: +1 519-578-6268 Fax: +1 519-741-1492

E-mail: [email protected] Home Controls (www.homecontrols.com)

This vendor specializes in home automation products that rely on a number of technologies including both X10 and personal computer-based systems. You'll find a number of specialty sensors, including those used for flood control, on this Web site. This company appears in chapter

4. In addition to the Web site, you can contact Home Controls at 7626 Miramar Road

Suite 3300 San Diego, CA 92126 237

Appendix A

Phone: +1 800-266-8765 Fax: +1 858-693-8892 E-mail: [email protected]

Home Security Store (www.homesecuritystore.com)

This vendor specializes in home security products of all types. You can get everything from home security hardware to personal security needs such as mace. This company appears in chapters 1, 3, 4, and 5. In addition to the Web site, you can contact the Home Security Store at

1660 Chicago Avenue Suite N-1

Riverside, CA 92507 Phone: +1 888-501-7870 or +1 951-782-8494 Fax: +1 951-782-8499

Technical Support: +1 951-782-8527 E-mail: [email protected] or [email protected]

Home Technology Store (www.home-technology-store.com)

This vendor sells a broad range of electronics, including home security systems. You can purchase either individual components or complete systems. The Home Technology Store also provides monitoring services for its customers. This company appears in chapter 1. In addition to the Web site, you can contact the Home Technology Store at Phone: +1 507-523-2146 Fax: 41 507-523-2708

In the Swim (www.intheswim.com)

This vendor sells a wealth of pool supplies. From a home security perspective, the most important items are the pool monitors and alarms. This company appears in chapter 3. In addition to

the Web site, you can contact In the Swim at E-mail: [email protected]

ar

Home Security Vendors

Information Unlimited (www.amazing1.com) This vendor sells a large number of unique alarm and personal protection products. In addition, youll find interesting electronics. For example, you can buy a Jacob’s Ladder (the kind used in

horror movies) or your own rail gun. This company appears in chapter 3. In addition to the Web site, you can contact Information Unlimited at

PO Box 716 Amherst, NH 03031-0716 Phone: +1 603-673-4730 or +1 800-221-1705 Fax: +1 603-672-5406

Motorola Broadband and Home Entertainment (http://broadband.motorola.com/ consumers)

The main security-related products for this vendor are camera systems, home control systems, networking, and related hardware. All of these systems focus on providing information to the

homeowner through a broadband connection. This company appears in chapter 4. In addition to the Web site, you can contact Motorola Broadband and Home Entertainment at E-mail: [email protected]

NFPA Catalog [www.nfpa.org/catalog) This vendor provides a wealth of code-related manuals such as the National Electrical Code (NEC) that the hobbyist will need to perform a complex installation. Many of these books are expensive, so you might want to review them at your local library before you make the online purchase. This company appears in chapter 3. North American Detectors (www.nadi.com)

This vendor specializes in sensors, including smoke and carbon monoxide detectors. Unfortunately, you can’t buy any products directly on the Web site, but you can obtain a list of retail outlets that carry the company’s products. This company appears in chapter 4. In addition to the Web site, you can contact North American Detectors at 2600 John Street Unit 15

Markham, Ontario, Canada 239

Appendix A ereeseeeeerenernane

—ceee

L3R 3W3 Phone: +1 416-493-9169 Fax: 416-493-9600

E-mail: [email protected]

OnSite PRO, Incorporated (www.onsiteproducts.com)

This vendor specializes in flood detection equipment that also stops the flood before it becomes a problem. This company appears in chapter 4. In addition to the Web site, you can contact OnSite PRO at Phone: +1 800-667-4833 E-mail: [email protected]

Orca (www.orcaweb.com) This is a service vendor that provides alarm system monitoring. This company appears in chap-

ter 2. In addition to the Web site, you can contact Orca at

Phone: +1 800-367-6722 E-mail: [email protected] Pacific Custom Cable, Incorporated (www.pacificcable.com)

This vendor supplies cabling and connectors for every home automation and security need. You'll also find a varied assortment of cable installation tools and tutorials to make the task of installing cable easier for specific technologies such as X10. This company appears in chapter 5. In addition to the Web site, you can contact Pacific Custom Cable at

4170 B Place Northwest Auburn, WA 98001 Phone: +1 800-931-3133 or +1 253-373-0800 Fax: +1 253-373-0100

Parts Express (www.pesupport.com)

This vendor provides a wide range of electronic components, security devices, test equipment, and tools. One of the interesting features of its Web site is the number of wizards provided for 240

me

SoCUI venCOTS

selecting parts based on specific needs. This company appears in chapter 3. In addition to the Web site, you can contact Parts Express at

725 Pleasant Valley Drive

Springboro, OH 45066-1158

Phone: +1 800-338-0531 or 513-743-3000 Fax: +1 513-743-1677

PartStore (www.partstore.com) This vendor provides a vast array of electronics and appliance replacement parts and accessories. With over 7 million parts and accessories from transistors to batteries, PartStore is a good

resource for the parts you need. In addition to the Web site, you can contact PartStore at 204 Enterprise Drive Kingston NY 12401 Phone: +1 866-925-PART

E-mail: [email protected]

Powercall Sirens.com (www.powercallsirens.com)

This vendor specializes in official stickers of all types. For example, you can obtain the tot finder and pet finder stickers from this Web site. This company appears in chapter 3. In addition to the Web site, you can contact Powercall Sirens.com at

708 Sentinel Drive NE Leesburg, VA 20167 Phone: +1 866-774-7367 or +1 703-669-1193 Fax: +1 703-669-1196

Protect America, Incorporated (www.protectamerica2.com)

This vendor provides complete packaged solutions based on the General Electric security system. This company appears in chapter 2. In addition to the Web site, you can contact Protect America at

5100 N. IH-35, Suite B Round Rock, TX 78681 241

Appendix A A EN

Phone: +1 800-951-5111 E-mail: [email protected]

Protection One (www.protectionone.com) This is a service vendor that provides alarm system monitoring. In addition to home monitoring, this company also provides business monitoring, so it’s a good solution for someone who wants

to protect both a home and a small business. This company appears in chapter 2. In addition to

the Web site, you can contact Protection One at PO Box 49292 Wichita, KS 67202

Phone: +1 800-GET-HELP E-mail: [email protected] Ramsey Electronics (www.ramseyelectronics.com)

This vendor is best known for providing do-it-yourself kits for all kinds of electronics, not just security systems. In addition, you can buy test equipment and some types of electronic components, such as antennas. You'll also want to visit this Web site for the how-to articles the vendor

provides. This company appears in chapter 4. In addition to the Web site, you can contact Ramsey Electronics at 590 Fishers Station Drive Victor, NY 14564

Phone: +1 800-446-2295 Fax: +1 585-924-4886 E-mail: [email protected] Safe-Mart (www.safe-mart.com)

This vendor specializes in security system components and home automation systems. You can find both common and exotic devices on the Web site, although the vendor tends to focus on standard products. Safe-Mart provides multiple versions of the same product from different manufacturers, so this is a good place to comparison shop. This company appears in chapter 4. In addition to the Web site, you can contact Safe-Mart at 242

2

SS

eee

Home Security Vendors

Ocusafe, LLC 27010 W Highway 24 St. Marys, KS 66536

Phone: +1 800-628-6093 or +1 785-437-2534 Fax: +1 816-222-0551

E-mail:[email protected] Safety and Security Center (www.safetyandsecuritycenter.com)

This company provides a wealth of safety products including panic buttons and 911 service for mobile users. You'll also find unique items such as child wander monitors and detectors that can tell you about someone tapping your telephone line. In addition to other unique products, you'll

find a number of self-protection devices, such as stun guns. You can find this company listed in chapter 1. In addition to the Web site, you can contact the company at Phone: +1 800-378-2957

Sams Technical Publishing (www.samswebsite.com) This vendor provides repair schematics for a wide variety of consumer electronics devices including televisions, radios, monitors, and more. The company’s database of over 210,000 models of

consumer electronics devices spanning sixty years, as well as its line of electronics-related books, can serve as a very valuable resource. In addition to the Web site, you can contact Sams Technical

Publishing at 9850 East 30th Street Indianapolis, IN 46229 Phone: +1 800-428-SAMS Fax: +1 800-552-3910

E-mail: customercare [email protected] SecureTech (www.secuready.com])

This vendor specializes in physical security solutions for computers. For example, you can use the solutions this company offers to secure the computer system used to control your security system. You can find this company listed in chapter 1. In addition to the Web site, you can contact SecureTech at 243

Appendix A

5755 Willow Lane Lake Oswego, OR 97035 Phone: +1 503-636-6831 Fax: +1 503-636-9642 Security Pro USA (www.securityprousa.com) This vendor offers a wide range of personal protection products, as well as monitoring devices

such as radon detectors. You can also obtain services, some of them exotic, such as hiring a per-

sonal bodyguard. A few of the items are worth noting in that they could affect your personal security. For example, this vendor offers an effective cellular telephone jammer, which may impair

your ability to get outside help. You can find this company listed in chapter 4. In addition to the Web site, you can contact Security Pro USA at

264 S. La Cienega Blvd Suite 958 Los Angeles, CA 90211

Phone: +1 800-264-8273 Fax: +1 310-475-7065 E-mail: [email protected]

Sensorsoft Corporation (www.sensorsoft.com) This vendor specializes in sensors that detect environmental conditions such as temperature,

humidity, and flooding. Many of these sensors include programmable features and all of them provide some type of remote monitoring. You can find this company listed in chapter 4. In addition to the Web site, you can contact Sensorsoft Corporation at

6375 Dixie Road Units 1&2

Mississauga, Ontario LST 2E7 Canada Phone: +1 905-564-0690 E-mail: [email protected]

Smarthome (www.smarthome.com])

This vendor provides a wealth of electronic gadgets. It’s possible to order everything from home theater systems to pet supplies (automatic doors, talking pet tags, and training devices are just a 244

me

Secuencia

few of the items). The Web site also stocks a number of technologies including both personal computer—based and X10 systems. This company is listed in chapters 4, 5, and 6. In addition to

the Web site, you can contact Smarthome at 16542 Millikan Avenue Irvine, CA 92606-5027 Phone: +1 800-762-7846 or +1 949-221-9200 Fax: +1] 949-221-9240

[email protected]

Spy Cameras and Hidden Cameras (www.4hiddenspycameras.com)

This vendor specializes in small, hidden cameras that you can use to view an intruder covertly. The vendor disguises many of these cameras to look like something else, such as a smoke detector. This company is listed in chapter 4. In addition to the Web site, you can contact Spy Cameras

and Hidden Cameras at Phone: +1 800-895-6745 StarDot Technologies (www.stardot-tech.com) This vendor specializes in cameras, camera hardware, cabling, and networking technologies. You

can find both single- and multiple-camera setups on the Web site. This company is listed in chap-

ter 5. In addition to the Web site, you can contact StarDot Technologies at 6820 Orangethorpe Avenue Building H Buena Park, CA 90620 Phone: +1 888-782-7368 or +1 714-228-9282 Fax: +1 714-228-9283

E-mail: [email protected] Surveillance-video.com (www.surveillance-video.com)

This vendor specializes in cameras of all types. It's possible to find cameras from multiple manufacturers (making it easy to comparison shop) that answer every surveillance need. This com-

pany is listed in chapters 4 and 5. In addition to the Web site, you can contact Surveillance-video. com

at

245

Appendix A Phone: +1 800-955-5201

E-mail: [email protected]

System Sensor (www.systemsensor.com) This company sells a number of unique sensor types, including the single-ended reflected-beam smoke detector. For example, you can find detectors for monitoring air conditioning and sprinkler systems on their Web site. This company is listed in chapter 4. In addition to the Web site,

you can contact System Sensor at 3825 Ohio Avenue St. Charles, IL 60174 Phone: +1 800-736-7672 or +1 630-377-6580 Fax: +1 630-377-6495

Systems & Electronics, Incorporated (www.seistl.com)

This company provides a broad range of security hardware, including exotic perimeter-security solutions. In fact, some of these solutions are more for military applications than home security,

but it’s enlightening to see just how complex some of these systems can become. You can find

this company listed in chapter 1. In addition to the Web site, you can contact Systems & Electronics at 201 Evans Lane

St. Louis, MO 63121

Phone: +1 314-553-4000

WebCamProShop (www.webcamproshop.com)

This vendor specializes in small, unique cameras that fulfill a number of security needs. All of the

cameras provide an Internet connection for remote monitoring. You can find this company listed

in chapter 5. In addition to the Web site, you can contact the WebCamProShop at Phone: +1 619-224-7467

Fax: +1 619-639-9914

Wiremold Company (www.wiremold.com)

This vendor specializes in cabling and cabling accessories. For example, you can find supplies for 246

eee

Home Security Vendors

hiding alarm system wires. This company is listed in chapter 5. In addition to the Web site, you can contact the Wiremold Company at 60 Woodlawn Street West Hartford, CT 06110 Phone: +1 800-621-0049 or +1 860-233-6251 Fax: +1 860-232-2062

E-mail: [email protected]

Woodcraft (www.woodcraft.com)

This vendor provides a wealth of tools you can use to install a security system, including specialized gauges for matching the screws you use to a drill bit for predrilling the hole. You can find this company listed in chapter 5. In addition to the Web site, you can contact Woodcraft at

1177 Rosemar Road PO Box 1686

Parkersburg, WV 26102 Phone: +1 800-225-1153 Fax: +1 304-428-8271

E-mail: [email protected] X10.com (www.x10.com)

This vendor supplies anything you can imagine for an X10 network. In addition to standard security, you'll find home electronics and automation. This company is listed in chapters 4, 5, and 7. In addition to the Web site, you can contact X10.com at Phone: +1 800-675-3044 E-mail: [email protected]

247

'

. a

i

-

:

yy

.

Py

71

.

|

; on

Se

SOT)

Ties

:

.

@+

.

2=

ad

a

ITTY

;

bas

a ft

Soe

Lt

;

2

0

a

if

oor)

APatT’

q

i ob Waihigp 7

—_

; ‘

ph

:

~~. D

a

7

-

a

F

hal

;

wt

-_|



,

|

ie

5s x

— |

a

7

|

|

a

7 |

|

: =

ae

; a

7 |

‘ a

=| wate

bg” }

J

:

J 7

v

,

APPENDIX B: FIFTY-TWO SAVVY TIPS FOR BETTER HOME SECURITY

This appendix contains fifty-two helpful hints that you can use to create better security in your home: There's one tip for each week of the year. As you build your security system, you'll discover new tricks and techniques that save time, save money, or make your security system more

effective. Now that I’ve shared my tips with you, I'd love to hear about any tips you might have. Write me at [email protected] to share them with me. 1. The only security that works is the security that you use. Installing a great security system and then forgetting to lock the door won’t accomplish much. You must use all of the security that you install to make it worthwhile.

2. Jalousie windows (the kind with multiple glass panes that simply slide open) can present a special challenge when you want to secure your home. You can find a simple Shook technique for making these windows more secure on the Honolulu Bulletin-Star Feature Web site at http://starbulletin.com/97/05/30/features/story2.html. 3. Never leave a message on your answering machine telling people that you are away on vacation or otherwise away from your home. Contact people who need to know about your absence using other means. In addition, never tell people when you'll return home

after being away. Intruders often call a house before they attempt to enter it, so leaving

these messages gives the intruder the green light. 249

Appendix B

SIS ole

ge

rn

4, Always assume the worst when you secure access to your security system. Disconnect personal computers when you don’t need them. Make sure you use a different password to access the automation.

Assume

that someone

can and will access your security sys-

tem at some point, and act accordingly. Remember that most intruders enter through the front door. When you don’t provide

proper front door security, you're giving the majority of intruders free access to your home.

Always use color security cameras. Homeowners who use black-and-white models are unlikely to get the desired result because the police can’t see important details about the intruder. In addition, make sure you use a high-quality camera to obtain the best-

quality picture. Grainy pictures don’t help anyone. Check the credentials of any monitoring company you hire. Verify that the company hiring process includes full screening of every individual. Obtain in writing the company policy for replacing goods stolen by company personnel. In a few cases, the very

individuals who are supposed to protect your home from intrusion end up as intruders themselves.

Look for a monitoring company that protects you against false alarms if you live in an area that charges for each false alarm. Many companies provide this service. Even though the monitoring service is a little more expensive, you'll find that the cost differential normally repays itself in one false alarm fee in a given year. In addition, these

companies are normally proactive about helping you avoid false alarms. Use tot finder stickers with care. Place them where an officer or firefighter can find them during an emergency. In many cases, this means placing the sticker directly on the front and back doors of your home. Don’t use tot finder stickers on the child’s window

because the officer won't have time to go around the house searching the windows for the sticker. It’s also not helpful to place the label on the child’s room door because the ‘ officer won't know the layout of the house. The same precautions hold true for pet

finder stickers. When you use these stickers, place them on the front and back doors of your home so the officer or firefighter can see the sticker immediately and react to it properly. 250

basis 5

en

Fifty-two Savvy Tips for Better Home Security

10. Never write down your password and place it near the keypad for your security system. If you can see the password, so can the intruder. When you must write down the password, place it in a location that you know is safe, such as within a home safe. i

Don't leave a key in an obvious place, such as over the door. Intruders know to look in the obvious locations. In fact, if you’ve seen it in a movie, it won't work for your key. Store a key in a lockbox with a combination lock if you think that you or someone else in the household will get locked out. You can see an example of a key lockbox at www.padlocks4less.com/Shurlok/Main.htm. Make sure you get the optional bracket so you don’t have to lock the lockbox to your doorknob.

12. Ask a neighbor to collect your newspaper and mail when you're away from your

house—don’t stop the mail or newspaper. In addition, consider asking a neighbor to park in your driveway to give others the impression that you’re home. Anything you can do to make people think you’re home when you leave for a trip will reduce the chances of intrusion.

1,

Avoid using an Internet connection to your security system unless you actually need

such a connection. Rely on neighbors, friends, or relatives to monitor your security system whenever possible, using a local connection, rather than using a remote connection to gain access to your security system. Remote connections can incur security risks that

actually put the intruder in the driver's seat. 14. Always use the correct kind of cabling for the task. For example, when you run a cable

through an air duct, make sure you use plenum cable. Not only is using non-plenum cable illegal, but the fumes from other kinds of cable can kill you during a fire. Buried cable has special coatings that make it less susceptible to moisture and the elements.

15. Consider the financial incentives for installing a security system. Most insurance companies offer a discount to homeowners who install a security system, yet many homeowners never claim the discount.

16. A failure to plan multiple escape routes from every room in the house has cost many

people their lives. Always create a comprehensive escape plan, post the plan in every room in your house, test it regularly, and train the entire household using the escape plan. 251

Appendix B

Le, Check security system vendors using multiple sources. It’s not enough to check with current customers about their level of service. Make sure you check with local or national organizations, such as the National Burglar and Fire Alarm Association (www.alarm.org), about the security system vendor as well. Verify everything the secu-

rity vendor tells you, including the status of the vendor's license. 18. Always obtain more battery backup than you think you need for a security system. You don’t want to lose power during a blackout

a prime time for intruders to test your

security system.

19. Verify the installation schedule with a third-party security vendor when you create a

hybrid system. Failing to meet the security vendor's schedule can result in overtime charges and loss of security system functionality. In most cases, you'll need to plan to

take time off work to complete the installation in a timely manner. 20. Display the security signs and decals the security company provides on your front lawn.

Even though these signs are unsightly, they provide a deterrent factor that the intruder will see. Many intruders won’t even attempt to enter your house when they see the security signs and decals.

21. Trim bushes and hedges around the outside of your home. Intruders like to use them as hiding places. In addition, taller bushes can hide intruder activities within your house.

22. Organize a community watch program. Your neighbors are often your best defense

against intrusion because they see your house every day. The mere presence of someone walking around the neighborhood is often enough to discourage intrusion and send the intruder somewhere else. 23. Avoid using the wrong chemicals to clean your security system. Using the wrong

chemicals to clean the security system can cause the device to fail or damage the entire system. 24: Remember that you always have four courses of action open to you when you need to

protect yourself physically from an intruder: you can escape from your house using an alternate route, deceive the attacker into thinking that you’re somewhere else, provide the attacker with a more attractive target, or physically protect yourself using any of a 202

en

Fifty-two Savvy Tips for Better Home Security

number of self-defense measures. Always rely on self-defense as the last-ditch method of protecting your life.

25. Reduce the complexity of your security system whenever possible. Some homeowners

make their security system so complex they can’t operate it. A simple addition, such as a barking-dog alarm, can provide good security in many cases, at a fraction of the price and complexity of higher-end systems. 26. Don't overextend yourself when it comes to a security system. If you don’t have the

knowledge required to install the security system properly, try a hybrid solution—one in which you work with a knowledgeable person. In many cases, the best option is to use a security vendor to install the security system for you and then rely on a monitoring company to help you track security system events. 27. Never use a security system vendor or monitoring company that has had financial prob-

lems. Always verify the financial status of the company before you sign anything because unstable companies often go out of business. The company’s history and time in the security business are also big factors.

28. Always buy the highest-quality parts for your security system that fit within your budget and system design. A lower-quality part might do the job, but it won't last as long and won't perform the task as well in many cases. 29. Some homeowners

assume that security film makes their windows impervious to a break-in. Security film reduces the risk of a break-in through a window and greatly

increases the time required for a break-in, but it can’t prevent a break-in. It’s also

important to remember that security film tends not to allow beneficial sun rays through; your houseplants will likely die after you install it. 30. Many intruders break into the home by kicking the back door in. The reason the door

is so easy to kick in is that most installers use very short screws that only attach the strike plate to the door frame. Using 3-inch screws ensures that the strike plate is attached into the house framing members, making it very hard to kick the door in.

3l. Keep the perimeter of your house well lighted. Darkness is the friend of the intruder

trying to gain entry to your house; keeping things well lighted will discourage intrusion. 253

32. Always place your system in a test mode before you maintain it. In addition, notify the

police, fire department, and your monitoring company about the test before you perform it. Police and fire departments alike complain that homeowners generate an incredible number of false alarms each year. Don’t add to the problem by failing to observe the required precautions during testing.

33. Make sure you remove power from the security system before you performance maintenance

tasks. Removing

Physically measure

power

includes

disconnecting

any battery power

source.

any voltage across the terminals of a device before you clean it.

Remember that cleaning agents and electricity usually don’t mix very well.

Design a safe room that includes a heavy door with a dead bolt, a battery-powered light, and a cellular telephone to obtain outside help. Evading the intruder or keeping the intruder at bay until help arrives is always better than directly interacting with the intruder. . Many homeowners fail to consider the time required to receive assistance in a remote

or secluded area. Make sure your home security system is up to the task in these areas.

Consider what it will take to keep the intruder at bay for the extra time required for police to respond. Some security and monitoring companies provide security personnel that can respond faster (test the response time to ensure you're getting what you paid for).

36. Maintain a good rapport with your security system. Learn how to use every feature it

provides. Some people install a complex security system and never learn how to use it correctly, resulting in loss when they most need to rely on the security system. 7. Avoid using security systems that contain custom parts. Using standardized parts pro-

tects your investment if the company goes out of business. A custom system might provide interesting features, but they are seldom worth the risk that using such a system entails. . Don't use a vacuum to clean security system components unless necessary. A vacuum

can suck up security system components and you won't notice the problem until you test the security system later. Using a paintbrush or quick bursts of compressed air will clean a component just as well and is less likely to result in a broken security system. 254

Late ht

Fifty-two Savvy Tips for Better Home Security

39. Create a wiring diagram and update it every time you make a change to your security

system. A wiring diagram can help you locate problems with the security system and makes it easier to discuss security system problems with a third party. 40. Maintenance is never optional with your security system. Always maintain your security

system by performing diagnostic tests, visually inspecting it, and replacing worn parts. Even if you have to rely on a third party to perform these tasks for you, the cost is minimal compared with the losses you suffer if you don’t maintain your security system. 4l. Install the lock correctly on patio doors to keep intruders out of your house and gain a

good level of security. Add protection by securing the door in its track with a metal bar to gain a better level of security. Use vertical bolt locks to make the door more secure and gain the best level of security. 42. Verify that any cameras you install actually point where you expect to see intruders.

Make sure you know about any blind spots in your security camera setup. Clean the lens with the appropriate cleanser and lens cloth regularly. Refocus the camera after each cleaning. Ask someone to stand in various locations outside so that you can check camera ranges and pointing as needed. 43. Never assume that fluorescent lightbulbs are the best solution for every lighting problem. Even though incandescent lightbulbs aren’t as energy efficient as fluorescent bulbs, an incandescent bulb provides the best balance of features in some cases. You

can find out more about lightbulbs in general on the Home Energy Online Web site at http://hem.dis.anl.gov/eehem/94/941109.html. 44. Always remember that the four levels of personal protection are physical, financial,

environmental, and psychological. Keep these four levels of personal protection in mind as you design and implement your security plan.

45, The rule that homeowners fail to remember most often is that a determined intrusion attempt always succeeds. When someone wants to get into your house enough, they'll

find a way to break in, security notwithstanding. In this case, you must reduce intruder progress through the home, monitor the intruder to provide the police with useful information, and provide incentives for the intruder to leave your home sooner rather than later.

46. Always check your monitoring company completely. Make sure you fully understand

the terms of your contract with the company. Check the fine print as well. Try to find 255

Appendix B

out more about the monitoring company online. Verify any complaints about the com-

pany and use this information when you select a monitoring company. 47. Train yourself to use a security system with a simulator whenever possible. Learning on the real thing sets you up for false alarm charges. Everyone makes mistakes when they learn a new technique, so using a system that the vendor designs for training can save you considerable time, heartache, and frustration.

48. Consider using a child abduction monitor when you feel that your child is at risk. These

devices can help you detect when a child wanders away and can even help when the child is in the backyard playing. It doesn’t take long for a child to wander away, so make

sure you keep track of her at all times. 49. Use a certified Home Technology Integrator (HTI) whenever possible to install your security system. Otherwise, you don’t know much about the person’s capabilities and could end up with a poorly designed installation. Even though using an HTI doesn’t

guarantee a good installation, it makes a bad installation less likely because you have verification of the person’s level of expertise. 50. Engrave your driver's license number, not your social security number, on all of your

valuables. Taking this step makes it far more likely that police will recover at least some of your valuables after a burglary. Even if the police don’t have any information about you at all, the presence of the driver's license number will alert them that the merchandise is stolen and who owns it. Make sure you remove your driver's license number from

any valuables that you sell to someone else. albe Photograph your valuables where they normally appear in your home so the police not only see the valuable but also see how it appeared before the intruder took it. Create a list of the make, model, and serial numbers for all of your valuables. When you finish

the list, place it in a safety deposit box or with a relative for safekeeping. Maintain receipts for the larger items in case you need to prove their value for insurance purposes. . Lock the door between your house and an attached garage. Don’t assume the garage door opener will provide adequate security. An intruder can use any of a number of devices to detect the code for the garage door and open it, which means your house is

completely open if you don’t lock the door.

256

APPENDIX C: AN OVERVIEW OF HOME SECURITY STANDARDS

You can build a security system without thinking about the standards. In fact, you can build a great security system that doesn’t follow any of the standards. However, the standards are still

important for a number of reasons. First, relying on the standards reduces costs because you can rely on the same parts as everyone else. Second, relying on standards tends to make the security system more reliable because the experts have documented the best way to accomplish specific security tasks. Third, standards tend to make security systems safer because organizations can use the standards to test a product to rigid specifications. Fourth, relying on the standards makes it easier for you to make good buying and installation decisions. Someone else has already performed the hard work of testing the security system devices for you. This appendix doesn’t contain every standard that might relate to home security, but it does con-

tain many of them. These standards can help you create a better home security system with far less effort and for a lower cost (even when the initial cost of a standardized product is higher,

adhering to the standards tends to reduce long-term costs). You won't find the standard excerpted here—that approach could require several books. The appendix provides an overview of the standard and provides you with a Web site URL instead.

Zon

Appendix C

STANDARDS DOCUMENTS The documents that appear in this section contain actual specifications—the information you need to make a good product choice or create a usable installation. A standard is a document that describes specific protocols, or rules for performing a task or manufacturing a good. The standard usually comes into being when a group of vendors within a specific industry agrees to a set of practices based on experience, experimentation, and scientific tests. The government also creates standards as part of the legal process. For example, when the government determines that

too many people die from car crashes each year, they provide a legal basis for adding safety equipment to cars. The foliowing sections contain both kinds of standards. ANSI/CSAA CS-V-01-2004.xx Alarm Verification and Notification Procedures

Alarm verification is a major concern that this document addresses. This standard defines methods for reducing false alarms in home security systems. Most monitoring companies currently

verify alarms through call verification. This standard defines additional techniques including call verification, cross zoning, and biometric, audio, and video verification. The main reason to know

about this standard is to ensure that any new security system you buy adheres to it so that your monitoring company can add the required functionality at some point (at least a few companies

provide these services now). You can download a copy of this standard at www.siacinc.org/docu ments/STANDARDS/ANSI_CSAA_CS_V_01_20040922. pdf.

ANSI/SIA CP-01 Control Panel Standard

The focus of this standard is reducing the number of false alarms in the home by modifying the functionality of the central control panel. It addresses event recognition and information handling procedures in software. The standard also addresses the need to test the security system in

new ways, such as verifying the security system layout. In addition, the standard addresses user needs and reduced user-related false alarms by considering the design of the user interface. You can request a copy of this standard at mailto:%[email protected]?subject=Request%20 for%20Complimentary%20Copy%200f%20ANSI/SIA%20CP-01. ANSI/SIA PIR-01 Passive Infrared Standard

This standard focuses on reducing the number of false alarms from Passive Infrared (PIR) detectors. For example, it provides guidance on overcoming environmental sources of false alarms. 258

Se

Overview of Home Security Standards

You can request a copy of this standard at mailto: %[email protected]?subject=Request%

20for%20Complimentary%20Copy%200f%20ANSI/SIA%20PIR-O1. National Electrical Code (NEC)

This code defines the requirements for running cables throughout a home. It also specifies how to perform tasks such as securing the cable and stipulates how you must terminate the cable within a junction box. You'll also learn which cables to use for particular tasks. For example, you

must use plenum cable within air ducts and the NEC defines this requirement. Unfortunately, you can't obtain a free copy of the complete NEC; you must purchase a copy of the book from a bookstore such as Amazon.com (www.amazon.com/exec/obidos/tg/detail/-/0877656258). SIA CCTV to Access Control Standard TVAC-01

It’s important to have a standard method for controlling a closed-circuit television (CCTV) from

an access control panel. This standard defines the communication specifics for both devices. It doesn’t define how the security system creates the connection, so devices can still use communication protocols such as TCP/IP, RS-232, and RS-485. Consequently, even though a system that

adheres to this standard guarantees a specific level of camera management capability, you also need to consider the way the two devices are connected. Unfortunately, you can’t obtain a free copy of this standard. However, you can buy a copy of it at www.siaonline.org/page.asp?c=storeproduct_62. SIA Glass Break Standard GB-01

Audio glass break sensors that adhere to this standard have a reduced incidence of false alarms due to incidental noises such as clapping. This standard also recommends new installation techniques that will reduce audio glass break sensor detection problems without reducing the sensitivity of the device. You can request a copy of this standard at mailto:%[email protected]? subject=Request%20for%20Complimentary%20Copy%200f%20SIA %20GB-O1. UL/ANSI 985 Standard for Household Fire Warning System Units

This is the main standard to look for when buying any fire-warning device for your home. This standard defines the construction and required components of a fire-warning device. The document also cites a number of other standards used to define the quality and construction of fire259

Appendix C

led ie elt

Te

eee

ES

Table C-1. UL Standards Associated with Fire Alarm Systems a

i

ee

UL No.

Edition

Neen

ee

eee

ee

ee

Ee

Title

eee

ee

ee

EEE

,

38

7

Standard for Manual Signaling Boxes for Fire Alarm Systems

1480

5

Standard for Speakers for Fire Alarm, Emergency, and Commercial and Professional Use

1635

3

Standard for Digital Alarm Communicator System Units

warning system components. Table C-1 lists the essential standards. The devices you purchase might not list all of these standards;

the UL/ANSI

985 standard

is the most

important.

Unfortunately, you can’t obtain free copies of UL standards. You can purchase them on Web sites such as COMM

2000 (www.comm-2000.com/).

UL/ANSI 1023 Standard for Household Burglar-Alarm System Units

This is the main standard for obtaining a high-quality burglar alarm system for your home. The document specifies the basic structure, central control panel, peripheral devices, installation procedures, and typical operation for a burglar alarm system. The document also cites a number of other standards used to define the quality and construction of burglar alarm system components,

along with details such as proper installation techniques. Table C-2 lists the essential standards.

The security system you purchase might not list all of these standards; the UL/ANSI 1023 standard is the most important. Unfortunately, you can’t obtain free copies of UL standards. You can purchase them on Web sites such as COMM Table C-2.

UL Standards Associated with Burglar Alarm Systems

UL No.

639

Edition

|

2000 (www.comm-2000.com/).

,

Title

7 ua

=p Standard for Intrusion-Detection Units

985

: 5

1610

3

|

S

as Standard for Digital Alarm Communicator System Units

1635

1641

|

4

Ts

Standard for Household Fire Warning System Units

Standard for Central-Station Burglar-Alarm Units

Standard for Installation and Classification of Residential Burglar Alarm Systems

eS ee ee ee a a

a

ee

ed

pi el id

Overview of Home Security Standards

UL/ANSI Supporting Standards

You could easily spend weeks looking for all of the possible UL standards associated with security systems. However, you don’t really need to know them all. The main standards define the security system, its supporting structures, and the materials used to construct the security system. Table C-3 lists a number of interesting supporting standards that help you assess the quality of the components in a security system. For example, you wouldn't purchase security system cabling without ensuring it meets the required UL standard.

OTHER HELPFUL DocUMENTS The documents that appear in this section aren’t actual standards. However, you can use them as

a starting point for creating standards of your own. For example, if you’re a member of a homeowners association, you can use the National Burglar and Fire Alarm Association (NBFAA) documents to create a policy on false alarms for your association. NBFAA Model Burglar Alarm Ordinance

This document contains a model burglar alarm ordinance that you can use as a basis for your own ordinance. The model document includes definition of terms, registration requirements, fees,

duties of the alarm user, and other essentials. It also includes information on a number of alarm types, including local, panic, and holdup, so the document doesn’t relate to a specific kind of

alarm. You can download this document at www.alarm.org/pdf/Ordinance_Burglar.pdf. NBFAA Model Fire Alarm Ordinance

This document contains a model fire alarm ordinance that you can use as a basis for your own ordinance. The document begins with a definition of terms. It also describes the fire alarm reg-

istration process and the requirements for installing, testing, and maintaining the alarm. As part of fire alarm control, the document describes nuisance alarms and fees associated with false alarms. You can download this document at www.alarm.org/pdf/Ordinance_Fire.pdf.

NFPA SUPPLEMENT 6 Home Security and Fire Safety

This document tells you about the security risks posed by door and window bars on a house. It provides recommendations for reducing those risks. You can download this document at www.nfpa.org/assets/files/PDF, /Supplement6.pdf. 261

Appendix C Table C-3. Other Useful UL Standards for Security Systems

5858S

UL No.

Edition

Title

Nee eee, eee ee ee

20

12

General-Use Snap Switches

44

15

Standard for Thermoset-Insulated Wires and Cables

62

16

Standard for Flexible Cord and Fixture Wire

83

13

Thermoplastic-Insulated Wires and Cables

94

SD

Tests for Flammability of Plastic Materials for Parts in Devices and Appliances

224

5

Extruded Insulating Tubing

310

li

Standard for Electrical Quick-Connect Terminals

486E

3

Standard for Equipment Wiring Terminals for Use with Aluminum and/or Copper Conductors

489

10

Molded-Case Circuit Breakers, Molded-Case Switches, and CircuitBreaker Enclosures

498

14

Standard for Attachment Plugs and Receptacles

506

12

Standard for Specialty Transformers

510

8

Standard for Polyvinyl Chloride, Polyethylene and Rubber Insulating Tape

OiliZ

10

Standard for Fuseholders

STANDARDS Groups A standards group is a privately, publicly, or governmentally funded

group of individuals who

conduct tests, perform experiments, create statistics, and use other means to define best practices based on scientific principles. A standards group will normally create a document that can

be discussed with both industry and government to ascertain the viability, usability, and correctness of the information the document contains. Once everyone agrees that the document con-

tains sufficiently high-quality information, the document becomes a standard. Standards often require revisions as the understanding of the processes they describe changes. The standards 262

pe fen

eens

Overview of Home Security Standards

Table C-3 (continued) Sc ee ee ee UL No.

ee

Edition

ere ee

ee,

(0

Seacey obeaten): ee

ee

ee

ee

ee

ee

ee

Metallic Outlet Boxes

Conduit, Tubing, and Cable Fittings 3

Standard for Nonmetallic Outlet Boxes, Flush-Device Boxes, and Covers

5

Standard for Polymeric Materials-Short Term Property Evaluations

746B

3

Standard for Polymeric Materials; Long Term Property Evaluations

746C

6

Standard for Polymeric Materials-Use in Electrical Equipment Evaluations

746D

6

Standard for Polymeric Materials-Fabricated Parts

796

8

Standard for Printed-Wiring Boards

817

11

Standard for Cord Sets and Power-Supply Cords

769°

4

Standard for Marking and Labelina Systems

1054 -

6

Standard for Special-Use Switches

1059

4

Standard for Terminal Blocks

746A

Rie

Lex

Title

group is also responsible for recommending and defining these changes. The following sections

provide a brief description of many groups that create standards or interact with them in some other way.

American National Standards Institute (ANSI)

ANSL, established in 1918, coordinates the voluntary standardization and conformity assessment system for the United States. The original organization included membership from the U.S. Departments of War, Navy, and Commerce, as well as five standards organizations: the Institute

of Electrical and Electronics Engineers (IEEE), the American Society of Mechanical Engineers (ASME), the American Society of Civil Engineers (ASCE), the American Institute of Mining and Metallurgical Engineers (AIMME), and the American Society for Testing Materials (ASTM). One of their most famous standards is that for the American Standard Code for Information 263

Appendix C

Interchange (ASCII) character set used by many computer systems. However, ANSI standards

affect just about every technology in use today, including the standards for home security devices. You can learn more about ANSI at

1819 L Street, NW

Suite 600 Washington, DC 20036

Phone: +1 202-293-8020 www.ansi.org

Central Station Alarm Association (CSAA)

This is a trade association that represents various member

groups including providers, users,

bureaus, and other agencies (some of which are listed by UL). This organization represents its members before Congress, so it deals specifically with legislation that affects security systems.

The CSAA was organized in 1950. You can learn more about the CSAA at 440 Maple Avenue East Suite 201 Vienna, VA 22180 Phone: +1 703-242-4670 Fax: +1 703-242-4675 www.csaaul.org National Fire Protection Association (NFPA)

The NFPA is most important resource to the home security installer for the National Electrical Code (NEC). All communities in the United States require that you adhere to the requirements

of the NEC when installing your security system. However, the NFPA has a lot to offer the home security installer in other areas too; the association provides standards for fire and building safety.

Many countries outside of the United States rely on NFPA standards. This group was established in 1896 and has earned accreditation from organizations such as ANSI. You can learn more about the NFPA at

1 Batterymarch Park Quincy, MA 02169-7471

Phone: +1 617-770-3000 Sales/Member Services: +1 800-344-3555 www.nfpa.org 264

joes eae

Overview of Home Security Standards

Security Industry Alarm Coalition (SIAC)

The SIAC specifically considers false alarms and alarm management. The main goal of this organization is to reduce false alarms and make alarm systems easier to use. When a vendor creates a system that meets the standards created by this group, you know that the alarm system will not only perform well but also provide the features necessary to reduce false alarms and make management tasks easier. You can learn more about the SIAC at www.siacinc.org. Unlike most organizations, this one has more than one contact address. You can find a list of contacts on their Web site at www.siacinc.org/contact_us.asp.

Security Industry Association (SIA) The SIA, formed in 1969, is a technology solution organization of more than three hundred companies. It represents a number of groups, including manufacturers, distributors, service

providers, integrators, and others. The organization helps standardize a number of technologies including CCTV, access control, biometrics, computer security, fire and burglar alarms, and

home automation. You can contact the SIA at 635 Slaters Lane Suite 110

Alexandria, VA 22314 Phone: +1 703-683-2075 or +1 866-817-8888 Fax: (703) 683-2469 www.siaonline.org/index_sia.asp

Underwriters Laboratories (UL) Inc.

UL isn’t a standards organization in the common usage of the term—they’re an independent testing laboratory (established 1894) that has made a reputation by creating standardized methods for determining device safety. UL has such a vast number of standards that you'll want to search their Web site for specific product listings. The safe bet is to use UL tested produces for your security system without exception. You can learn more about UL at 333 Pfingsten Road Northbrook, IL 60062-2096 Phone: +1 847-272-8800

Fax: +1 847-272-8129

www.ul.com 265

Appendix C

Other Groups and Organizations

Many states have their own local groups and organizations that help set local standards. You'll want to locate these organizations and ensure that your security system meets any local requirements. Here are examples of just a few of these local groups and organizations. Alabama Alarm Association (AAA) Alarm Association of Florida (AAF) California Alarm Association (CAA) Illinois Electronic Security Association (IESA)

Louisiana Burglar and Fire Alarm Association (LBFAA)

Massachusetts Systems Contractors Association (MSCA) Mississippi Alarm Association Inc. (MAA)

New Jersey Burglar and Fire Alarm Association (NJBFAA) New York Burglar and Fire Alarm Association (NYBFAA) Pennsylvania Burglar and Fire Alarm Association (PBFAA) Tennessee Burglar and Fire Alarm Association (TBFAA) Wisconsin Burglar and Fire Alarm Association (WBFAA)

266

GLOSSARY

This book includes a glossary so that you can find terms and acronyms easily. It has several important features you need to know about. First, every acronym in the entire book appears here, even

if there’s a better than even chance you already know what the acronym stands for. (The glossary does exclude common acronyms such as units of measure because these terms are easy to find in other sources and most people know what they mean.) This way, there isn’t any doubt that

you'll always find everything you need to use the book properly. Second, these definitions are specific to the book. In other words, when you look through this glossary, you're seeing the words defined in the context in which they’re used in this the book.

Finally, I've used a conversational tone for the definitions in most cases. This means that the definitions might sacrifice a bit of accuracy for the sake of better understanding. The purpose of this

glossary is to define the terms in such a way that there’s less room for misunderstanding the intent of the book as a whole.

AC off sensor—Sce alternating current off sensor. AH rating—See amp hour rating. alternating current off sensor (AC off sensor)—A device that detects the current building

power status. When the building loses access to line power, the alarm sounds. 267

Glossary

Wat To Do IF You Don’t FIND IT HERE While this glossary is a complete view of the words and acronyms in the book, you'll run

into situations when you need to know more. No matter how closely | look at terms throughout the book, there’s always a chance I'll miss the one acronym or term that you really need to know. In addition to the various sources information found in the book, I’ve directed your atten-

tion to numerous online sources of information throughout the book and few of the terms the Web site owner's use will appear here unless | also chose to use them in the book. Fortunately, many Web sites on the Internet provide partial or complete glossaries to fill in the

gaps: e Acronym Finder: www.acronymfinder.com

e

Do-it-yourself Home Security www.easyhomesecurity.com/definitions.htm

e

Glossary

of Cell

Phones

and

Wireless

Plans

Terms:

www.fromallangles.com/

glossary/cell-phone-wireless-plan e

Glossary of Home Alarm Terms: www.swintech.com/glossary_of_terms.htm

e

Home Security Glossary: www.homesecurityinformation.com/home-security-

glossary.htm e

HowStuffWorks: www.howstuffworks.com

e Tech Terms Glossary: www.partsexpress.com/resources/a.html e TechEncyclopedia: www.techweb.com/encyclopedia

e Webopedia: http://webopedia.internet.com e Whatis?com: http://whatis.techtarget.com ¢ yourDictionary.com: www.yourdictionary.com re

268

SC

eee

ssiary

American National Standards Institute (ANSI)—An organization dedicated to creating stan-

dard implementations of common technologies. For example, this group created the American Standard Code for Information Interchange (ASCII) character standard commonly used for application development. American Standard Code for Information Interchange (ASCII)—A standard method of

equating the numeric representations available in a computer to human-readable form. For example, the number 32 represents a space. The standard ASCII code contains 128 characters (7 bits). The extended ASCII code uses 8 bits for 256 characters. Display adapters from the same

machine type usually use the same upper 128 characters. Printers, however, might reserve these upper 128 characters for nonstandard characters. For example, many older Epson printers use them for the italic representations of the lower 128 characters. This is the standard character set used by all Windows 9x implementations. amp hour rating (AH rating)—The number of hours that a battery will provide power to a

device consuming 1 amp of current. ASCII—See American Standard Code for Information Interchange.

BBB—Better

Business Bureau

bistatic sensor—A

monitoring device that contains two sensor elements. The device can trans-

mit and receive data at the same time, making the sensor more efficient than a monostatic sen-

sor of the same design. In addition, depending on the device type, the vendor can optimize the send and receive elements to have better characteristics for a particular task.

breaking glass detector—A device that detects glass breakage using either shock or audio detectors. Shock detectors mount directly to the window and rely on extreme vibration to detect the breaking glass. An audio detector relies on sound waves of specific characteristics. Standard practice is to mount an audio sensor near, but not on, the window. Also known as a glass break detector.

carbon monoxide (CO)—A colorless, odorless gas usually created by incomplete combustion

of volatile materials including wood, propane, oil, and natural gas. This highly toxic gas produces a number of symptoms in humans including headache, dizziness, nausea, and death. 269

carbon monoxide detector—A device used to detect the presence of carbon monoxide (CO)

in the air, Combination detectors look like standard fire alarms and provide an audible signal at a predefined concentration. Better sensors provide a parts per million (ppm) readout that the user can compare with established CO levels that have known effects on humans.

carbon monoxide fire detector—A device that detects the presence of fire by monitoring the carbon monoxide (CO) in the air. A fire naturally produces CO as it burns. CCTV—See closed-circuit television.

central control panel—the main component of a security system that contains the alarm circuitry, backup battery, alarm software, and other central components. The central control panel has connections for each zone of the security system, displays, keypads, and other inputs and outputs.

central station monitoring facility (CSMF)—a remote connection to a security system that intercepts emergency events and routes them to the appropriate authority. The event signal normally originates in the central control panel. The signal travels to the remote location using standard telephone lines, fiber optic connection, radio transmitter, or other means. The receiver can include a monitoring company or something as simple as a cellular telephone. CFL—See

compact fluorescent lamp.

child abduction alarm—A special two-part device that alerts a parent to a wandering child. The child wears one part of the device, while the parent carries the other. When the two devices

are separated by too great a distance, the alarm sounds. closed-circuit-system—A security system in which the contacts are normally close. The contacts open in response to an event causing the alarm to sound. The main advantage of a closed

circuit system is increased security. Because power always flows in this system, an intruder can’t

cut the wires to disable the system. closed-circuit television (CCTV)—A monitoring system comprising one or more cameras, at least one display, and associated monitoring elements (such as a device for displaying the output of four cameras on one display). The CCTV relies on a local signal, rather than an external signal, for input. CO—Scee carbon monoxide. 270

eC

ssary

compact fluorescent lamp (CFL)—A fluorescent bulb designed to work within a socket that usually contains an incandescent bulb. A CFL can save significant power, while still providing the same light level as an incandescent bulb. CompTIA—Computer Technology Industry Association covert monitoring—Unobtrusive or hidden detection of individual activities or events. Covert monitoring usually infers secrecy or spying in order to gain information that visible monitoring can't provide. For example, you can use covert monitoring to track the natural (non-camera)

reactions of children or discover how an intruder is accomplishing a specific task. CSMF-—See central station monitoring facility.

digital video disc (DVD)—A high-capacity optical storage medium with a capacity of 4.7GB to

17GB and a data transfer rate of 6(00KBps to 1.3GBps. A single DVD can hold an entire movie DVDs come in several formats including DVD-R, DVD-RW, DVD+R, DVD+RW and DVD-RAM that allow read-only or read-write access. Newer dual-layer

or approximately 7.4 CD-ROMs.

DVDs promise even greater storage capacities. All DVD drives include a second laser assembly used to read existing CD-ROMs. Some magazines also use the term digital versatile disk for this

storage medium. digital video recorder (DVR)—A device used to record digital images from a camera or other

input device onto a medium such as a DVD.

Doppler effect—The apparent change in frequency when a frequency source is in motion relative to a source receiver. The frequency increases as the source and receiver approach each other and decreases as the source and receiver move apart. Named after Christian Johann Doppler.

DVD—Sce

digital video disc.

DVR—See digital video recorder.

EEPROM-—Scee electrically erasable programmable read-only memory. electrically erasable programmable read-only memory (EEPROM)—A special type of nonvolatile memory (memory that retains its contents even after the power is turned off) that Zn

Glossary

allows erasure using an electrical input. Using EEPROM memory is relatively slow when compared to other memory types such as random access memory (RAM). An EEPROM is used for specific memory needs, such as storing equipment settings.

electromagnetic interference (EMI)—The radio waves produced by devices other than a target device. The EMI sources interfere with the signals produced by the target device and can hinder device operation. Common sources of EMI include televisions, radios, and vacuum cleaners. EMI—See

electromagnetic interference.

flash memory—A

special type of nonvolatile memory (memory that retains its contents even

after the power is turned off) that allows erasure using an electrical input. Unlike electrically

erasable programmable read-only memory (EEPROM), flash memory allows erasure in blocks,

making it faster than EEPROM but still slower than technologies such as random access mem-

ory (RAM). Most vendors use flash memory to store user data or equipment settings. fps—Frames per second

graphical user interface (GUI)—1. A method of displaying information that depends on both

hardware capabilities and software instructions. A GUI uses the graphics capability of a display adapter to improve communication between the device and its user. Using a GUI involves a large investment in both programming and hardware resources but reduces overall system complexity for the user. 2. A system of icons and graphic images that replace the character-mode menu system used by many older devices. The GUI can ride on top of another operating system (such as

DOS, Linux, and UNIX) or reside as part of the operating system itself (such as Macintosh and Windows). Advantages of a GUI are ease of use and high-resolution graphics. Disadvantages include cost, higher workstation hardware requirements, and lower performance over a similar

system using a character mode interface. GUI—See graphical user interface.

hardwired system—A system in which all devices have physically wired connections. heat sensor—A device used to measure the temperature differential between an object and the 272

Glossary

environment or to measure environmental temperature alone. Heat sensors rely on a number of

detection methods including thermocouples and infrared detectors. Monitoring devices use heat sensors for a number of tasks including detecting fire, verifying the operating temperature of an appliance, and monitoring the activities of an intruder, Home Technology Integrator (HTI)—An electrician or other qualified individual with specialized training required to perform home automation or security system installation. HTI—See

Home Technology Integrator.

HVAC—Heating, ventilation, and air conditioning

IEEE—Scee Institute of Electrical and Electronics Engineers.

infrared (IR)—A spectrum of light just below visible red light in the 750-nanometer to 1-millimeter wavelength range. All heat sources generate infrared light.

infrared detector—A device that detects light in the infrared (IR) frequency range. IR devices

rely on a number of technologies including silicon semiconductors and thermocouple arrays to analyze and detect everything from flame and gas to movement. Institute of Electrical and Electronics Engineers (IEEE)—A standards group for the electronics and computer industries founded in 1884. This group developed the 802 standard, which defines protocols for local area networks (LANs).

integrated smoke detector—A device that normally incorporates multiple sensors within the same case. The most common example of an integrated smoke detector is one that combines a smoke detector with a carbon monoxide detector.

integrated voice dialer—A device that automatically dials a telephone number and provides a voice output. An integrated voice dialer is normally associated with alarm systems or other forms of notification setup designed to alert the user when specific events occur.

intrusion deterrent—Any method of discouraging entry. The use of distraction, misleading information, visual effects, or psychological methods to keep an intruder at bay.

IR—See infrared. 273

Glossary

keypad—An input device that relies on discrete buttons for input. Pressing a button invokes the function marked on the top of the button. A keypad tends to provide a longer functional life than a touchpad.

LED—See light-emitting diode.

light-emitting diode (LED)—A semiconductor device that emits light when power is applied to it. listen-in system—A security system that includes one or more microphones used to listen to events taking place inside or outside the house from a remote location. A listen-in system can include cameras so the homeowner can see, as well as hear, events. Some listen-in systems also

include a speaker so the homeowner can talk to people inside the house. The homeowner need not monitor the listen-in system constantly; many monitoring companies provide listen-in services as an option.

macro—A

series of recorded instructions that define tasks performed by an application or

device. The application can be the operating system, as in the execution of a batch file. In some

cases, the programmer creates the instructions on one device and sends them to another device for execution. microwave—High-frequency

electromagnetic

energy in the l-millimeter

to 1-meter wave-

length range. This frequency exists between shortwave radio and infrared. microwave

detector—A

device that detects electromagnetic energy in the microwave

fre-

quency range. Most microwave detectors act as a form of radar and depend on active signal transmission for detection.

monostatic sensor—A monitoring device that contains one sensor element. The same element transmits and receives data. Consequently, the device receives information at only half the rate

of a bistatic sensor of the same design. However, a monostatic design is usually less costly than its bistatic counterpart. MOS—Metal oxide semiconductor

motion detector—A device for detecting movement using a number of techniques including 274

Glossary infrared, ultraviolet, and microwave. The device signals an event whenever it senses movement within its design limitations.

motion detector trap—A motion detector placed in a location where an intruder can’t easily escape it, such as a hallway or stairwell.

multimodal device—A device that can perform multiple tasks or display more than one kind of information. The mode determines the task that the device performs. For example, a monitor

can display multiple kinds of information and use mode switches to change the information display. multiplexing video camera—A video camera system capable of accepting multiple camera inputs and displaying them on a single output device. The most common systems have 4 inputs, but other systems have 2, 8, 16, 32, or 64 inputs.

National Electrical Code (NEC)—The regulations governing the installation of electrical and

electronic systems within a building. The NEC specifies the requirements for a safe installation. National Television System Committee (NTSC)—The common television format for North America. NEC—See

National Electrical Code.

NEMA—National NTSC—See

Electrical Manufacturers Association

National Television System Committee.

open-circuit system—A security system in which the contacts are normally open. The contacts close in response to an event causing the alarm to sound. The main advantage of an open circuit system is low power use.

PAL—SA2258277

physical protection, 24 physical security, 27, 33, 36, 42, 44, 60, 83, 84, 85, 86, 94, 97, 98, 104, 117, 122) 141 5G: 190, 191, 192, 223, 237, 243 pie closet, 97

pocket PC, 143 police, 16, 20, 26, 27, 30, 33, 39, 414974548 50, SDD moO 62, 64, 69, 79, 80, 82, 83, 84, 86, 94, 97, 99, 109, 119, 125, 148, 154, 156, 162, 165, 167, 178, 190, 191, 198, 200, 207, 25025425 be bOR TO

pool alarm, 79 power-off testing, 176 price, 19, 20, 26, 27, 32, 38, 39, 43, 44, 56, 57, 61, 62, 64, 66, 67; 68:-/0:177, 95, 103 A105. 107, 108.110, 120, 139145. 173,184,201 2253

professional, 12, 14, 16, 17, 32, 30) 41,43, 44746 5160/70; 82, 83,87, 88-9a, 97 alls. 129, 159, 169, 171, 210, 211, 216, 228, 236, 260, 282

protected enclosure, 133 protection, 16, 19, 20, 21, 23, 24, 20, LO°S02300 89747, 92) o>: 57, 60, 63, 69, 80, 81, 84, 95, 96, 100, 101, 104, 106, 108, 118, 13), 132, 142,145, 152 156, 171; 176192 NGSRI95.

199, 219, 231, 239, 242, 243, 244, 255, 264 Protection One, 69, 242

psychological protection, 24 PTZ, 134, 137, 221, 275, 276, 278 radon detector(s), 11, 107, 153, QNANOIAN IAA

rain(s) 109, 132, 133, 186 ramp(s), 99, 100 RCA inputs, 136

reaction(s), 39, 45, 78, 112, 116, TIGL, 163, 170,189, 195.913.

224, 226, 250, 271, 280 record(s), 38, 45, 60, 80, 111, 125, 156,165; 166; 175, 204:

209, 210, 271, 274, 279

security layer: delay, 45, 46; detain, 45; detect, 45; deter, 45; react, 45; record, 45 security panel, 88, 117, 119, 126, 131, 146, 147, 160

Security ProShop, 134, 136, 138 security solution, 16, 19, 25, 33, 34,30, 365.387 41, 48, 52. 54, 09, 60; 74, 10, 77, 19, 81, 82. 83, 93, 99, 102, 103, 120, 143, 155; 159) 181-216,:230,.233: 243, 246 security vendor signs, 29, 252

self-defense, 22, 23, 47, 48, 50, 60, 84, 104, 156, 192, 253

self-test(s), 185, 194 sensor screens, 98, 235

shock-type glass break sensor, Pillis), py!

remote areas, 39, 40, 41, 43, 69,

showers, 99

96 . remote connection(s), 203, 251, 270 report(s), 37, 55, 64, 65, 94, 105,

sign(s), 29, 54, 55, 64, 66, 67, 70,

149, 168, 176, 181, 193, 196,

232 RF transmissions, 142, 280

rise of heat detector(s), 61, 105, LOGs tol eb 1s 215 rural area(s), 16, 39, 40, 41, 47, 58, 65, 69, 73, 82, 97

SAB voltage, 166 safe room, 13, 22, 29, 38, 48, 83, 84, 86, 98,117, 254, 277

screwdriver, 79, 85, 86, 100, 172, OAlye

secluded area(s), 35, 39, 40, 41, 43. 59) 81, 154, 215, 254

security company, 20, 21, 38, 45, 65507007 1473.87.89, 15; 999, 252,

security film, 86, 98, 253 security firm, 50

1d», IOP, Jie, Ways), IGT, Tk NSOWISi = 2OSN ABN 2235 252. Des}

small office, 32, 33, 37, 38, 278 small office / home office (SOHO), 32, 278

soffit, 132, 226 software, 44, 77, 85, 87, 88, 109, DLT 12, 121129144) 146; 148, 149, 159, 160, 193, 194, 195, 196, 197, 201, 202, 207, 220, 226, 230) 258) 2(0n2 re. 282 solar-powered devices, 115, 184, DML OSI, USO sound) 26°27, 39: 42.45, 53.073: 75, 79, 88, 96, 104, 106, 112, 117, 138, 149, 152, 159, 166, 163) 1690170 Ri al 72 ie. 174, 178, 186, 188, 228, 267, 269, 270, 275, 276, 278 special devices, 189, 194, 195, 278 special need(s), 22, 80, 99, 100, 119, 236 spy cameras, 112, 245 stand-alone devices, 194 standardization, 56, 254, 257, 265, 278, 279 StarDot Technologies, 133, 245 STAT-USA,93 sunlight, 42, 95, 114, 126, 127, PAS

Smarthome, 109, 117, 130, 132, 136, 137, 138, 172, 186, 194, 195, 244, 245

Smarthome.com, 109, 117, 130, WBA Weis),

Oe Baal Oils:

smoke, 11, 24, 30, 61, 62, 63, 80, 101, 104, 105, 106, 118, 127, Lois 3e1 594165) 169.4170:

E71, 174, 1972 208, 210; 211, QA) ONL Dilisy, DING)

kG, Seal.

932; 239, 945, 246, 273, 276, 21 278 smoke detector(s), 62, 63, 101,

talking keypad, 66 telephone detector, 119 temperature sensor, 97, 116, 174, 193, 194, 197, 198, 278

template(s), 129 testing, 12, 13, 15, 18, 24, 44, 46,

48, 57, 65, 69, 77, 79, 84, 85, 88, 89, 107, 108, 134, 136, 139, 142, 144, 148, 149, 151, DOD Selo wlooml>remlioos 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170,

10405 =106512 7-1sly 153;

Loe

73,146

159, 165, 169, 170, 171, 174, QOS 211213214215. 216, OANTE DiS Didtay De (ok uae Santa 277,218

Lili.

179185897192.

193, 194, 198, 204, 208, 210, 211, 216299 996 227,-228" 9402 2429, 251, 252. 254.255;

285

Index

Dole LOO ee 279, 282

12626203) 260)

vacuum(ing) 220, 254, 272 validation, 152, 159, 208

Test Equipment Connection,

VGRSIy

158 Test Equipment Depot, 158 third-party solutions, 19, 21, 48, 5O. 14, 75,90, 91. 121, 143. 146, 174,1757191, 206,207, DIO F212) 228.2952 2255, 280 timer(s), 42, 43, 67, 182, 183, 184, 185, 186, 189, 194, 196, 1974200) 201 .3205.-279 tot finder sticker(s), 78, 79, 250

vibration, 40, 115, 126, 269, 277 video modulator(s), 136, 137 video monitor(s), 21, 135, 136,

training, 23, 47, 48, 56, 65, 75,

76, 80, 192, 199, 208, 220, 236. 244) 256)278 transmission, 134, 142, 274, 276, 280 trap(s), 44, 68, 90, 95, 96, 97, LOO MIT 2ASbS 2} Triangle Cables, 158

University of Illinois, 105 upgrade, 20, 57, 66, 67, 202, 208, 210, 225, 226

urban area(s), 16, 39, 41, 42, 43, 58, 97

1407279

137, 140, 279

video quad, 136, 137, 279 volumetric sensor(s), 40 wall vibration sensor, 115 weekend, 37, 79, 88, 162, 164, 165, 185

wide-angle-lens cameras, 133 window(s), 20, 25, 26, 27, 29, 33, CONG (NOOR AL DOS OLN O4mOD: 66, 67, 78, 82, 83, 84, 85, 86, 88, 89, 95, 96, 97, 98, 102, Se SS LOM 22: 125 SOO MIAI AS aA A os: si, Wate), IGA, Tei, TUT, Tyee 187, 190, 191, 198, 202, 213, PANSY, Silke), VAIS) OR BONS OOM, DAO UPN, Stay, LO, BAS) SIEM). DAS, Zod LOO 420d, coke eo,

window bar(s), 20, 37, 83, 98, 118, 119, 141, 191, 261

vacation, 27, 32, 40, 41, 79, 110, 185, 187, 193, 215; 249

286

window contacts, 62, 64, 66, 67 window film, 86, 237

wired systems, 35, 43, 64, 74, 79, 82, 87, 98, 108, 109, 110, 132, 143,233,272, 280

wireless systems, 32, 43, 44, 57, 59, 60, 62, 64, 66, 67, 79, 85, 87, 98, 105, 106, 108, 109, LIO@I2I122. 12425 iG: 132, 138, 142) 143, 144 145, 147, 178, 233, 268, 276, 280

Wiremold, 128, 246, 247 wirepuller, 85 wiring diagram(s), 87, 88, 255 wood rot, 222 Woodcraft, 129, 247 woodstove(s), 107, 117, 118, ISL, BAUS

X10, 69, 109, 110, 111, 125, 142, 143, 145, 178, 183, 186, 188, 194, 196, 197, 198, 199, 201, 236, 237, 240, 245, 247, 280 X10.com, 109, 110, 125, 201, 240, 247 ZigBee, 145, 188, 194 zone(s), 56, 60, 106, 117, 118, 122.123.1924, 125, 165,166; 168, 185, 193, 196, 198, 227, 270, 277

ABOUT THE AUTHOR

John Paul Mueller is a freelance author and technical editor. He has writing in his blood, having produced sixty-six books and over three hundred articles to date. The topics range from networking to artificial intelligence and from database management to heads-down programming. Some of his current books include several C# developer guides, an accessible programming guide, a book on .NET security, and books on Amazon Web Services, Google Web Services, and eBay Web

Services. His technical editing skills have helped over thirty-nine authors refine the content of their manuscripts. John has provided technical editing services to both Data Based Advisor and Coast Compute magazines. He has also contributed articles to magazines like DevSource, InformIT, SQL Server Professional, Visual

C++ Developer, Hard Core Visual Basic, asp.netPRO,

Software Test and Performance, and Visual Basic Developer. He is currently the editor of the .NET electronic newsletter for Pinnacle Publishing (www.freeenewsletters.com/). When John isn’t working at the computer, you can find him in his workshop. He’s an avid wood-

worker and candle maker. On any given afternoon, you can find him working at a lathe or putting the finishing touches on a bookcase. He also likes making glycerin soap and candles, which come in handy for gift baskets. You can reach John on the Internet at [email protected]. He is also setting up a Web site at www.mwt.net/~jmueller/; feel free to look and make suggestions on how he can improve it. One of his current projects is creating book FAQ sheets that should help you find the information you need much faster.

287

~ Take It To The

Nio.