Security Tips and Industry Musings

Doors and windows

Lew Stouffer - Tuesday, May 27, 2014

Security systems require sensors to tell it in what condition monitored parts of the premises are in. The sensors we use on doors and windows are called contacts. This is a generic term for small switches that let the control panel know a door or window has been opened or closed. There are many different styles of contacts. These contacts can be activated through magnetic or mechanical force. Whether the contact is connected to the control panel by a wire or through a wireless transmitter makes no difference. As part of the "Guided tour of the security system" series,  I'll illustrate several of the more common contacts and their uses below.

Recess contacts- These devices are installed inside the door jamb facing the side of the door. The switch is pushed into the jamb so that it is flush with the jamb itself. Directly opposite of the switch, a magnet is pushed into the side of the door so that it is also flush. They are installed similarly into a window, with the switch in the sill and the magnet in the sash. Once installed these switches are not visible until the door or window is opened. When the door is open, the magnetic force is removed, sending a signal to the control panel. These contacts are most commonly 3/8” or 3/4”.  The magnet must be within 2” gap (typically) of the switch to maintain “contact”.

Surface contacts- These switches have many applications. When they are used in home security systems they are typically mounted on the exposed interior of the door or window. The switch is installed on the molding surrounding a door and the magnet is attached to the door itself, directly opposite of the switch. The application for windows is very similar. The magnetic gap is the same for these contacts is the same 2” as the recess contacts. Most wireless transmitters have surface contacts built into the circuitry of the transmitter. This allows the transmitter to be used as a contact as well.

Rollerball contacts- The rollerball contacts (or plunger) are switches that use mechanical force to sense the condition of the door. Unlike the other styles of contacts, these switches should only be used on doors that require the contact to be on the side of the door where the hinges are located. They are installed in the door jamb (on the hinge side) in a hole usually 3/4“. Like the recess contact above they are not visible when the door is closed. Unlike the magnetic switches, there are no magnets used with these contacts.

Overhead Door contacts- These switches are much more robust versions of surface switches. They are typically encased in a steel housing and mounted on the floor of the garage or warehouse. A large magnet is attached to the garage door directly opposite the switch. They are typically used in business security systems in an industrial location. 

Security Systems communications

Lew Stouffer - Wednesday, April 23, 2014

Today, we have many methods for the security system to communicate with the monitoring center. The days of having to have a traditional land line from the telephone company are gone. It’s a field ripe with choices. I’ll touch on several of them and the pros and cons of each.

POTS- Plain Old Telephone Service, is a reliable form of communication. The POTS system allows voice transmissions through a direct wired point to point connection. The security system is connected to your existing home phones in a manner that will disable your phones temporarily in the event of an alarm condition that it needs to call out. After the communication is sent to the monitoring center, the phones will be restored for regular use. Some of the benefits of this system include no additional monitoring charges and reliable service. The drawbacks include the ease with which the service can disconnected (By a burglar or storm cutting the wires to the premises) and the need to insure that your security system is still functioning properly if ever there is service performed on your phone system.

VOIP- Voice Over Internet Protocol, is very similar to POTS system in the manner that they are connected to the security system.  The major difference between POTS and VOIP is how the voice signal is transmitted. The VOIP system utilizes a portion of the bandwidth available from your internet service to send its signal. They are not recommended for security system use. There seems to be a wide gap in ability to use these systems for security systems between the different providers. The basic rule of thumb that we have seen is the old adage of you get what you pay for. The less the VOIP system costs the less likely it is to be able to transmit alarm signals reliably. These systems have the same limitations as a POTS system with the added problem of needing a battery backup to work in power outage conditions. Additionally, if you have service performed on your phone or data network it is possible to affect the security systems connectivity.

Internet Monitoring- Utilizes the current internet bandwidth to transmit signals to the central station for security system monitoring. It has the drawbacks of being easily defeated by cut wires or power outages (as in the above examples). The costs involved are similar to a primary cell system (below) because of the need to purchase an internet module and server time.

Cellular Monitoring- Also popularly known as wireless. A cellular system requires the purchase of a cell communicator that is designed to work with the security system. It is essentially a cell phone that is mounted with the control panel equipment. Like all cell phones there are airtime fees involved to keep the system active. The advantages are that they are completely independent of the other systems on the premises. They are not subject to cut wires and are connected to the security systems back up power supply in the event of a power outage. They do suffer, to a lesser degree, from some of the same issues as cell phones. 

Control Panels

Lew Stouffer - Thursday, March 27, 2014

The brains of any security system is called the control panel (panel), or more universally, the motherboard. It can come in several different styles that we’ll go over later. As a rule, the control panel is the center of your security system. It determines the functions that you and your security company have available for programming. The specifications of a panel can be quite extensive. Generally speaking though, the average user will be a good fit for most of the panels available. The three most important considerations that we face with the average user is the number of zones available, the number of user codes available and the ability to upgrade the panel for future needs.

As I stated earlier in the series, the manufacturer of the panel really doesn't matter too much. As long as your choice stays inside the major manufacturers you will find this to be relatively true across the board. They all produce a high quality product. They all offer a wide variety of options. The difference for most applications usually comes down to the preference of the installation company. This preference is very similar to the age old Ford/ Chevy argument; personal preference.

There are two major panel styles available. Self-contained and the traditional panel.

The self-contained panel has all of its components inside one box that has the keypad on the front. They offer compact size (in comparison to the traditional panel) and ease of installation. While some of these of these offer hardwired zone connections, most current panels of this type do not. Most self-contained panels are designed to use wireless security equipment. Typically the only wiring necessary for these type panels is for the power supply and the communication connection if you are choosing a source other than cellular. These units are more expensive and due to the wireless nature of the systems are quicker to install.

The traditional panel arrangement consists of a circuit board that is contained inside of a metal box. This type of system typically offers a wider variety of options than the self-contained type. Most of these type control units are designed for use with a wired security system, adding a wireless receiver allows for the incorporation of wireless devices as necessary.

The self-contained units are a good fit for applications where the owner may move frequently. Their nature of installation makes them easy to remove and reinstall at the new location, often without the need of reprogramming. The more traditional panel is Atlanta Home Alarms recommended system for almost every other application. The additional time and lower cost allows for a more personalized installation.

The user interface

Lew Stouffer - Tuesday, March 18, 2014

The keypad is the standard user interface for your security system. It allows you to turn the system on and off as well as giving you access to system controls, such as assigning new user codes. Every system needs one. They come in many different variations.

LED or Icon displays are the lower end of the keypads available. Typically they display system information by lighting a led light or an icon that the user then needs to interpret. For instance, the “number 1” will illuminate to show that zone 1 is open.

Fixed displays are the most common these days. They display the system information from a fixed selection of words and numbers on an LCD screen. Zone violations are typically displayed as a number. These keypads do require a little interpretation on the part of the user.

The next step up in usability and price would be Custom displays. These keypads display the system information using a customizable list of words and numbers. For example, instead of the keypad displaying a “1” to mean that zone 1 is open, it would display “front door”. Many of the security systems higher functions require this type of keypad for them to be displayed. These keypads are typically a little more user friendly because of the way they display the information.

Touchscreen keypads have been available for several years now. They offer the flexibility of the custom keypad with a much cleaner look. Many of these kind of keypads offer the ability to act as an electronic picture frame as well. There is a pretty steep price climb to this keypad though. Touchscreens also allow some aspects of home automation to be utilized through one device.

How many keypads are needed? Generally speaking, it is best to have a system control on each floor of the premises. This allows for the most flexibility when using your security system. A typical installation would have one within reach of the entry door(s) and one in the master bedroom. Which leads us to the other forms of system controls available.

Key fobs are an inexpensive convenience item that can expand the usability of your security system considerably. They key fob is a small remote control for your security system that is limited to about a 50 feet range. It can be put on your keychain and used much like your cars remote fob. They typically have several buttons (we only install 4 button key fobs) Armed Away, Armed Stay, Disarm and a police Panic button. An interesting use that a customer of ours uses their key fob for is to allow the cleaning crew access to their home without giving them a code. They have a prearranged location to leave the key fob on cleaning day. On days the cleaning crew is not to have access to the home the key fob is moved from that location. Simple but effective.

Another control that is gaining in popularity is the smartphone app. It gives the convenience of the key fob, minus the Panic button. It also allows the user to see the systems event history. For instance, if you are at work you can see what time you kids get home from school. Smart phone apps also allow the user access through a standard web browser. 

A guided tour of the security system

Lew Stouffer - Friday, March 14, 2014

Whether you are currently in the market for a security system or simply need some additional information; I hope to provide you with enough information to get an idea of the different devices usages and capabilities. Armed with this information, you should be able to better assess your security system requirements and your specific needs.

Most of the information will be universal in its application. Security system manufacturers have similar products in terms of products and capabilities. 

The Holidays

Bob Peters - Monday, December 23, 2013

It’s that time of year again. By this point you are running to the store to find that last minute present. Doing the grocery shopping for that special dinner. Cleaning the house and soon everyone will be there! It is easy to overlook things this time of year. Don’t let your security be one of them. Here are some helpful tips to remember as you prepare for the holidays.

  • Have a neighbor pick up the mail while you are out of town.
  • Do not put the boxes from expensive gifts on the curb for trash collection.
  • Put a central light on a timer so the house looks occupied. Maybe, the neighbor who is picking up the mail can turn the lights and TV on and off in different parts of the house?
  • Tell your neighbors your plans for the holidays so they can keep an eye on your property.
  • Secure items in your yard that may help someone break in.
  • Have a safe and happy holidays!

Garages and Security

Bob Peters - Wednesday, December 18, 2013

Garages have evolved into an odd assortment of space. Consider yours for a moment. If you are like most people, it has become your main entrance, a large closet, odds and ends collection point, home for your pet and a general project workspace. I’m sure I left some uses out, but you get the idea. With that much going on there, think about what someone looking at your garage could tell about you. The first thing is, are you home? Do you have expensive items visible? Is the door cracked to allow air flow for your dog? By the way, this means Fido is not inside your home protecting it. A potential thief can tell a lot about you and your family by simply looking in your garage. There are some simple steps you can take to avoid giving too much information to the wrong person, and improving your home and families security overall.

To start with we should make it as hard as possible to see inside. Keep the garage door down as much as possible. If you have windows in the garage cover them so someone cannot see into it. There are several films that can easily (and cheaply) be applied to the windows to obstruct the view. Curtains or blinds work for this as well.

Overhead doors have some special considerations you need to think about. That cord hanging from the automatic door opener is a problem. Cut it off. It is possible to push the door from the top, reach in and pull that cord to release the door. Use the doors locks when you go on vacation. If your door doesn’t have locks (a lot of them don’t now days), you can attach a C-clamp to the rail right above a roller on both sides to block the doors travel.

The interior door should be as solid as your front door. Add a peep hole so you can see into the garage without entering.

Take a look at what you store there. The more expensive items should be out of sight from the street. Maybe move that tool chest to the back of the garage? Trash cans towards the front? The less conspicuous your belongings are the better.

 Consider expanding your security system (or getting a security system) to cover the outer garage doors and windows. Low cost, no-contract alarm monitoring from Atlanta Home Alarm Systems can add lots of security for a small price.

Burglar Alarm Buying 101

Bob Peters - Friday, November 08, 2013

While doing my morning read through of the news, I came across this article By Clark Howard in the AJC. Clark has some excellent points to consider before you make your security system purchase. While many of the ideas are fairly old fare for those of us that have followed Clark’s words of wisdom. It’s good to get a refresher and put it in front of people that may have missed it in the past. The last point is probably the most important. Do your security shopping before you need a system. Emotions run high after a break in. Many people overbuy when trying to secure their home after the fact.

Rereading this was good for me. It made me reexamine something that I already knew, and add my observations from my experiences from the other side of the sale. After years of selling security systems I have seen several points that most people overlook. Understanding your goals helps the representative you are going to meet best serve you.

Before you contact any companies for quotes, take a minute to understand what you want to do. Do you want to protect the Picasso’s in the living room or have additional piece of mind while on vacation. There can be a large cost difference between the levels of security.

Take stock of how your family lives in the home. Do the kids get up early while you sleep in on Saturday? If so, you may need several keypads or fewer motion detectors. Do you have pets that are given free roam of the house? Would you be alright with limiting their access while the alarm is on? Do you travel for work? Will this impact how you want to use the system? Maybe adding remote access and cameras is something you would like to do. These are some of the most common items we run across while working up an estimate for our clients.

Once you have done the first two steps, you are almost ready to start calling security companies. The last thing you should do is take stock of your home. Walk around the outside of the house. Are there points that look like good opportunities for burglars? How do you want to address them? Will adding physical barriers (more/better locks, stronger doors, less glass) solve the issue for you? If not, add that to the list to talk to the security company’s representative about. While you are walking around the outside, count the number of doors and windows you need to cover. This helps us be able to give you a ballpark estimate over the phone.

Now that your homework is complete, you are ready to start calling Companies. Friends’ referrals are a great source to start with. Call/email those companies and ask for a quote. One thing to keep in mind if you use email is to check your spam folder. (Many times I have responded to prospective clients, but have received an angry call the following week complaining that I haven’t responded yet; only for it to be found in the spam folder!) Most companies will insist on sending a representative out before quoting, some (like Atlanta Home Alarm) will be happy to give a quote based on what you tell them you need. 

Security and Social Media

Bob Peters - Thursday, August 22, 2013

Atlanta Home SecurityWhen you go on vacation, you should not update social media until you have returned. Naturally, you want to share the fun and antics of the family getaway, but this information can be invaluable to the wrong people.

The problem is that most people have larger friend lists on their social media accounts than one would comfortably share this information with. Criminals can find out a wealth of information by simply watching your accounts. This simple step helps to keep potential thieves from knowing when you will not be home.

Security Foundations

Bob Peters - Thursday, August 08, 2013
The foundation of any security plan starts with the strength of the building's physical features. Strong, properly fitting doors that latch solidly are a must. Consider investing in reinforcing your door jambs to protect against burglars kicking in your doors.  Ensuring that windows are not cracked, fit properly and have good locks can go a long way toward securing your home.

While you are taking stock of the physical features of your home, look at the outside property. Imagine you are going to break in.  How would you do it? Is there somewhere you could hide to approach the house? Perhaps you might plant some dense, thorny bushes in those places to discourage a person from going there. Some lighting might be added for the nighttime hours. Are there items on the property that could be used to gain entry? These are concerns that should be addressed.

A good emergency plan is also an important part of your family’s security foundation. Just as you have a plan for escape in case of fire, you should have a plan to escape a burglary in progress or a personal assault. Examine your property again. What would you do if you were approached in your driveway as you came home? How would you react if you were suddenly surprised by an intruder inside your home? These, unfortunately, are situations that should be considered before the need for action occurs.