Showing posts with label Burglar Alarm. Show all posts
Showing posts with label Burglar Alarm. Show all posts

Tuesday, March 1, 2022

Comparison Metrics for Intrusion Panels

 Comparison Metrics for Intrusion Panels

In this note, we reviews fundamental features and attributes for evaluating and comparing intrusion alarm panels.  These criteria are:

·        Number of Hardwired Zones

·        Number of Wireless Zones

·        Number of Keypads Supported

·        Multiple User Codes Supported

·        IP Programming and Control

·        Advanced Features

·        System Expandability

·        Video/Access/Fire Integration

·        Dealer Only

·        Installation & Commissioning

Inside we define and describe each of these criteria.

Comparison Chart

The ability to condense the 10 points into a standard format is critical for comparing systems to each other. Conceptually, these factors form a graphic like this example:

For quick 'executive summary' level comparison, a chart is useful. However, our standard report method includes detailed descriptions of each of those 10 points. In the sections below, we describe in detail each category.

Number of Hardwired Zones

How many areas a panel can monitor is a core feature. Keeping track of number of sensors is too simplistic and not always helpful.  Many sensors can often be connected in series, for example in a bank of windows several sensors may be wired together in a chain and connected to the panel in one circuit. If one contact opens, the entire zone the circuit is connected to alarms with no specific indication of which sensor is reporting trouble.  

However, granularity can be achieved when zones are associated with one or a small number of sensors in an building's area. In this way, comparing number of zones is a useful metric.

Number of Wireless Zones

Not all panels or systems support wireless sensors.  Moreover, some panels may only support wireless with optional equipment or in one specific zone. As with hardwired, comparing wireless zones is the standard attribute.

Number and Type of Keypads Supported

For many systems, the type and ability to have multiple input keypads is a major consideration.  While most alarm systems support one installed keypad, the location where it is installed may be inconvenient for quick access by users in all protected areas. Also, the utility of a basic alpha-numeric pad cannot be compared to a full graphic touchscreen that may display or even sound more descriptive messages or be integrated with other systems like video surveillance.

Multiple User Codes Supported

Akin (সদৃশ) to key control or access control, 'user codes' should be assigned to and may be provisioned differently for individual users. Basic alarm systems may support 20 user codes and be more than enough for a typical residential install, but that number may be too limited or small for small commercial use.

Likewise, each code may carry different privileges, from a 'master' configured to do anything, to a 'temporary' that may expire after one use that is only valid for a specific range of hours.

IP Programming and Control

Not all panels have a web or network interface for notification, control, or programming from a networked device.  While this may not be a major dealbreaker for a simple user, the expectation of easy programming, use, and integration often depend on this feature.

Noting the options and type of IP connectivity is key for modern systems, but many systems lack it or require additional parts to make it happen. This category also indicates the usefulness and/or cost app-based or remote access controls.

Advanced Features

Comparing additional non-essential, but still valuable, attributes of individual systems is key. For example, 'line supervision', or the ability to detect weather sensors on a circuit are tampered with, is not often a major consideration in residential or even small commercial systems, but is often critical in high-security applications. Likewise, noting how many events can be logged into panel memory may make a big difference in some designs but not all.

System Expandability

The maximum number of zones a system supports often require additional hardware or modules to achieve that what is available by default on a stock panel. Additionally, the supported number is often different than the individual number of hardwired zones plus wireless zones available from expansion hardware.

In other cases, hardware zone expanders may physically support connecting hundred of zones, while the underlying panel only supports a fraction of that number. Noting 'expandability' clears up potential confusion.

Video/Access/Fire Integration

In terms of tying other systems into the intrusion system, the variation and ability of supported systems is substantial. Some systems support basic access control or video surveillance camera integration by default, while others require additional hardware or software for proprietary devices. Others may not support any integration at all.  Understanding the options are important comparison factors.

Dealer Only

Understanding the availability, support, and pricing structure behind a platform is another key information point.  Many alarm products are not available via distribution, and understanding this point often is a factor is weighing buying and support options.

Installation & Commissioning

Check installation team shouldn’t hide any password, must now share installed sensor details with others. Select professional and they must invite you to put password and user-id creation. They must trained you in easy way and handover all document related product and there company details for telephonic support. 

If you still aren't sure how you manage your building / establishment/ Shop Burgler alarm system or Intrusion Alarm System, feel free to get in touch with one of our experts via ssaintegrate@gmail.com. Before selecting vendor / installer check and verify they are authorized or not to execute your Burglar or Intrusion Alarm system work. It’s suggested Burglar alarm or Intrusion Detection & Alarm System commissioned by certified professional.


Monday, November 15, 2021

Should I Upgrade My Existing Security System?

Should I Upgrade My Existing Security System? 

A security system is designed to do one thing: keep you, your property, and those you care about safe. However, if you are using a security system that is ten or more years old, it may not be able to provide you with the level of security you want or need. Not only are older systems susceptible to malfunction, but since they are less sophisticated than systems available today, they put you at risk of malicious activities by tech-savvy thieves.

Unsure how to decide whether it is time for your upgrade? Below are three reasons that you should consider installing a new security system today!

Here are four signs it is time to upgrade your security system:

1. Dated technology
Security systems are not a once-in-a-lifetime investment. Like any piece of technology that you purchase, they have to be frequently updated and maintained to optimize their functionality. Your security system is like a phone — it requires periodic investment and replacement over time, not to mention that since technology changes so quickly, your device could soon become obsolete.

2. Alarm safety
Before the days of wireless data, security systems were operated via land lines with wires that could be easily manipulated by unwanted intruders. Luckily, since modern alarm systems operate using cellular transmitters to send and receive messages, they provide a safer alternative for homeowners.

At Video, Intrusion or Fire Monitoring in India, we have partnered with Netra Monitoring to provide customers with specialized Interactive Alarm Monitoring services, including home automation, remote arming and disarming, thermostat control, video surveillance and much more. Unlike an outdated security system, the Alarm Monitoring service feature can be managed centrally for one location or multiple locations through an app on your iPhone, iPad, or Android-powered device.

Your safety is of the upmost importance, but with Netra Monitoring, it doesn’t have to be an inconvenience.

3. Transmission
The biggest reason security systems become obsolete is that technology becomes outdated. Since most modern security devices use the same towers as cellphones to send and receive alerts, it is most likely that the reason your product will be unusable is that, much like a cell phone, the network it uses to operate is no longer available.

The good news is that there is often quite a bit of overlap in what networks are available. For instance, 2G technology is being phased out, but 3G, 4G, and 5G are still available and often work interchangeably.

What is great about a system that works on this kind of network is that while 2G will soon be unavailable, you don’t have to replace your entire system to still use it. Often, you will need to replace a small component to keep it running.

4. Protecting Your Investment
The best way to ensure that you are getting the most out of your investment is to purchase your new security system from a company that is dedicated to making your experience with their product the best one possible. At Fire Monitoring at India, we perform regular service and maintenance on your products and make sure you are informed of any upgrades that your system requires and technology changes or your system ages.

We think of keeping an alarm system up-to-date as being similar to maintaining a car. Just because your car gets old doesn’t mean it is useless — if something breaks, you fix it and keep on driving. By working with one of our technicians, you will get more life out of your equipment than you ever imagined and be able to enjoy the safety you deserve for years to come.

When your security system becomes an afterthought – and eventually an outdated afterthought – it leaves your building vulnerable.

Netra Monitoring installs custom-designed, scalable, user-friendly usable commercial intrusion alarm systems, and we feel that even the least experienced user will be able to use our systems with the proper training. Netra Monitoring also work for Central Alarm Monitoring with Video Verification services in India.



Wednesday, December 16, 2020

Intrusion Alarm Circuits Guide

Intrusion Alarm Circuits Guide 

Intrusion alarm circuits are a fundamental element of wired intrusion / burglar systems. Designing the intrusion alarm circuit greatly affects its performance. In particular, more efficient circuit designs introduce less resistance and cause fewer false alarms.

Alarm Circuits Overviewed

Intrusion alarm circuits use wires between an Intrusion alarm panel and various sensors. When the circuit / connection of those wires is broken (e.g., an alarmed window opens), the alarm is triggered if the system is armed / enabled.

How an Alarm Circuit Works

An intrusion alarm circuit consists of a pair of wires running from an intrusion alarm panel to a sensor, such as a magnetic contact. Electrical charge flows from the positive terminal, down one wire, and into the sensor. When something causes the sensor to close, it completes the circuit, allowing the charge to flow down the other wire and back to the negative terminal on the panel.

In the case of the contact, the circuit is complete because the magnet causes the reeds to touch, allowing current to flow from the reed on the positive side of the circuit to the reed on the negative side.

Using a pair of wires to connect both sides of the sensor to both terminals on the panel creates a large circle, which is where the word circuit comes from. The electrons flow freely all around this circuit, from the positive terminal on the panel, through the sensor, and back to the negative terminal. Opening the window will cause the reed to separate, which will break the circle and stop the flow of electrons. In other words, opening a window will create an open circuit. It is this open circuit that causes an alarm condition.

Loops vs Splices

The two most common ways to add multiple sensors to circuits is to use loops or splices.

Loops are preferred because it creates a short pathway, which means less resistance, fewer points of failure and faster to install. However, loops can only typically be used in new construction where the technician has the ability to run wires and loops through the window frames before the drywall is installed. Prewiring requires coordination with the general contractor or the carpenter. The alarm company needs to be able to schedule a technician to complete the wiring before the drywall crew is scheduled to begin installing drywall, and the carpenter should be told where to drill holes on the moulding or window frame.

Splices should be minimized because they add resistance and are more time consuming to install. However, adding alarms to exiting homes or businesses typically require this since it is not feasible to open the drywalls to run a looped circuit.

Two types of splicing exists: field splice and ITB (in-the-box) splice. The benefits of field splices are lower total circuit resistance and using less wire, but it requires a more skilled technician to hide the splice. By contrast, ITB splices are easier to troubleshoot, have fewer potential points of failure and they can be done by a less experienced installer, but they have higher total circuit resistance and require an installer to home run a wire to each individual window.

Loops Explained

The image below shows an example of a loop that allows two windows to share a circuit. Opening either the top sash or the bottom sash of either the right window or left window will cause the same zone to open. To accomplish this, a technician runs a single wire from one contact to another, allowing the current to travel around the windows in a circle. The technician leaves a loop at every window, which will bring the circuit in one side of the contact and out the other.

One wire of the pair runs to the window on the right, and the other runs to the window on the left. The technician has run loops of wires from one side of the contact to the other. One side of the contact on the top right window has a loop running to one side of the contact on the left (shown in black below). The loop between the top left contact and the bottom left contact (shown in RED) completes the circle, as long as all the windows are closed.

Field Splices

A field splice is one that is made at the device end of the wire, usually at the device itself. A skilled technician can make a field splice if the conditions are right. Splices must be accessible for future troubleshooting, so a field splice can only be made if there is someplace to hide them away from casual view. For example, when wiring windows, a technician can staple the wire to the underside of the frame or moulding, out of sight but easily found by an experienced / certified intrusion alarm troubleshooter. Intrusion alarm installers commonly wire all sirens and strobes in a location to a single circuit, and make field splices inside the siren box.


In this example, a pair of wires (green) is running to the alarm panel. Red wires are running to magnetic contacts on the bottom sash and the top sash of the right window, and blue wires are running to the top sash and the bottom sash of the left window. One red wire is spliced to one blue wire, leaving one red wire and one blue wire to be spliced to the green wires.

ITB Splices

ITB splices, or in-the-box splices, are those made inside the alarm can. Separate wires are run to each individual contact, and they are then joined up at the panel using a splice.

ITB splices are much easier for inexperienced technicians, and much faster to wire up. Making ten splices, one after another, to add ten devices to five zones, is faster than making a splice at every entranceway and then figuring out how to tuck them away. They are also much easier to troubleshoot if properly labeled in the can, because a troubleshooter can quickly isolate the circuit branch causing the issue, and does not have to first find and identify the splice. However, running individual wires is more more labor intensive, and uses more wire.

Circuit Electrical Specifications

All devices in an alarm, including unpowered devices such as contacts, require a specific amount of charge flowing through the wires at a specific speed and pressure or it will not work.

Every circuit has a voltage, current, and resistance value:

  • Voltage is measured in volts (V).
  • Current is measured in amps (A).
  • Resistance is measured in ohms (Ω).

Voltage is a measurement of how much electricity is available for use. Every device lists the amount of voltage it requires to operate.

  • If given too few volts, the device will either not power up or will work erratically.
  • If given too many volts, it will either shut down or overheat.

Current is the pressure at which the charge flows. All devices consume, or draw, electricity at a predetermined rate.

  • Not enough amps may cause the device to work harder to draw voltage, which could cause it to either shut down, overheat, or work erratically.
  • Too many amps is not harmful as the device cannot draw more current than it can use.

Resistance is anything that slows the current. Factors that increase resistance are

  • Number of connected devices
  • Wire length
  • Splices
  • Time
  • Copper oxidization

Too much resistance on a circuit will lower the current, making it more difficult for the alarm to monitor the zone properly. Since resistance increases in all circuits as time goes on, improperly designed circuits have a high probability of causing false alarms years after being installed. Therefore, every effort should be made to keep the resistance as low as possible.

Parallel Versus Series

The two methods of joining multiple sections to a single circuit are parallel and series. Devices can either be wired in parallel or in series with each other. Circuits using parallel splices are called parallel circuits, and circuits using series splices are called series circuits.

In a series splice, one of the pair of wires is spliced to one the next pair of. This way, no matter how many pairs of wires are added, the end result is two wires that are simple to connect to two screw terminals. In between, lots of wires are spliced to each other. This makes troubleshooting simpler, because a technician can simply test a single branch of the circuit at a time. Series is typically best for connecting a small number of devices to a circuit. It is faster and easier to wire up. The downside is that series introduces a lot more resistance if too many devices are connected.

In a series circuit, the wires from each branch of the circuit will be spliced together until two wires not spliced to anything are left. These single conductors will be connected to the screw terminals, while the splices 'hang' in the air, not connected to anything but each other. No matter how many devices and wires are connected to the circuit, there will always be only one wire to connect to the positive and one to connect to the negative.

Parallel splices are typically best for connecting a large number of devices to a single circuit, or for circuits that draw lots of power. It greatly reduces the amount of resistance, allowing those large numbers of devices to be connected. However, it is harder / more complicated to implement, will not work if done incorrectly, and is more difficult to troubleshoot later on.

In a parallel circuit, all the matching sides of the wire pairs are simply spliced together, with the end result being two thick wire twists. This can be a challenge to connect to screw terminals. In order to troubleshoot the wire going to a branch of the circuit, a technician must first undo the entire splice.

Experienced alarm technicians develop a 'feel' for when to splice devices in parallel and when to splice in series. However, the key determinate is this: when a series splice will result in too much resistance, a parallel splice must be used. Before splicing anything, technicians can test a circuit in order to determine the amount of resistance present.

Measuring Resistance

Resistance is measured using a digital multimeter, or DMM. To measure resistance, turn the function dial of meter to the Ω (ohms) symbol, and touch the leads to the bare wires of the circuit. Technicians measure resistance in order to

  • Test that all devices on a circuit are functioning normally
  • Decide whether to keep devices on a zone or to split them up among multiple zones
  • Decide whether a circuit should be wired in series or in parallel
  • Record a baseline resistance at the time of installation
  • Troubleshoot, as a zone with a resistance reading well over baseline can indicate a broken wire or defective sensor

How Much Resistance Is Too Much?

There is no clear answer to the precise amount of devices, and consequently the precise amount of resistance, that should be allowable on a single detection circuit. As a general rule of thumb, many installers try to keep the baseline resistance on a single circuit to ~40Ω. Remember that the resistance will inevitably creep up over time, depending on the number and nature of sensors connected to the circuit, the number and nature of splices on the wire, the exact composition of the wire, and even the environment, which could cause the wire to oxidize faster or slower. The following animation shows the current slowing the more devices are added to the circuit:

Different alarm panel manufacturers have different standards for what constitutes an alarm condition, but all those standards are based on the panel reading the resistance on a zone circuit. If a circuit has a reading significantly higher than 40Ω, consider either using a parallel splice or splitting the zone, removing some devices from one zone and wiring them to a new zone.

Some installers prefer ITB splices because it allows them to decide to split the zone later on. If devices have been wired together using wire loops or field splices, this is not possible.

How Many Devices Is Too Many?

In theory, an installer can connect all the doors on a single zone, all the windows on another zone, all the motion detectors on a third zone, and so forth. However, this is quite an inefficient way of using an alarm. The more devices are on a single zone, the harder it will be for the user to figure out which device is causing the zone to be open.

If all the windows in a room are on a single zone, the user will have to check all of them before being able to arm the system. If a user wants to keep a single window open while arming the rest of the system, they would have to bypass all the windows in the room, which is a higher security risk than simply bypassing a single window. If central station needs to dispatch police or fire to the user's site, they will only be able to give a vague description of the location of the problem, not a specific location.

Most panels can only handle a limited number of zones out of the box. Using additional zones requires purchasing and installing zone expanders, which add to the overall cost of the installation. Using multiple zone expanders may require adding a second can, which likewise adds to the cost. The question of when to combine devices on a single zone and when to separate devices into separate zones has no easy answer, but becomes clearer with experience.

Wiring Sirens

Wiring sirens is slightly different than wiring other alarm devices.

  • Sirens are rated in watts, not volts like all other alarm devices
  • Watts are a measure of how much a power a device outputs
  • Volts a measure of how much power a device uses
  • Most sirens are rated to 30 watts

Most panels only have a single siren output. However, many applications call for the volume to be lower on some sirens than on others. For example, a siren mounted indoors would cause hearing damage if sounding at a full 110dB, but 110dB is necessary for notification outdoors. In order to have different volumes from a single output, installers can choose to wire sirens in either parallel (for louder volume) or in series (for lower volume). They can even choose to wire some sirens in parallel and other sirens in series. The sirens in series have more resistance than the sirens in parallel, so that there is more resistance, and therefore fewer watts, forcing the siren to sound at a lower volume.

Intrusion alarm siren wiring is a perfect illustration of Ohm's Law.

Ohm's Law

Understanding Ohm's Law makes alarm troubleshooting much easier. Ohm's Law states that there is a direct relationship between volts, amps, and ohms, specifically that volts equals amps times ohms. Amps is ohms divided by volts, and ohms is volts divided by amps. Adding resistance (ohms) makes the current (amps) go down, and adding current (amps) makes the resistance (ohms) go down.

The simplest way of lowering or raising the power available to the siren is by raising or lowering the resistance. This raises or lowers the amount of available power, which in turn affects the operation of the siren.

Understanding Ohm's Law can help a technician diagnose and repair power supplies, sensors, circuits, and sensors. Changing a splice from series to parallel, replacing a power supply for one that outputs the same voltage at a higher amperage, or adding a resistor are all repair options that an installer has once they understand how Ohm's Law works.

Source: IPVM.com & circuitstoday.com

Thursday, October 1, 2020

WORSHIP SURVEILLANCE DETECTION

WORSHIP SURVEILLANCE DETECTION

India has one place of worship for every 400 people, more than the countrywide spread of educational and medical institutions put together. And it does not seem that the pattern is going to change soon.
We often come and go from our Houses of Worship (HOW) with very little thought about who may be watching our activities. If we have implemented basic security precautions, we are probably comfortable in our setting. Security and worship can be successfully blended for those who worship in your facility. No house of worship (HOW), whether a church, mosque, temple, or synagogue is exempt from crime, whether committed by an internal member, a stranger, or as a random act of terrorism. On 5th September 2018 District Magistrate Srinagar, Dr Syed Abid Rasheed Shah, has ordered for installation of CCTV cameras in and around all prominent shrines, mosques and temples in the district.


Terrorists often gather significant pieces of information from open sources such as Google Maps and social media post­ings. They collect a lot of data about their target of interest and eventually they will conduct physical surveillance. After collecting initial data about the HOW, the terrorists will begin to survey the location, trying to determine the best time and mode of attack. Terrorists may look for a soft target that will bring instant publicity and maximize impact. A soft target can be a facility that doesn’t lock its doors or provide any type of security. Finding no resistance to their surveillance, they quickly realize there will be little or no threats to their safety, allowing them easy access in and out of the building. Depending on their plan of attack, they may send more skilled members to collect additional information by conducting surveillance inside and outside of the facility.
Risk Assessment
How do you know if someone is watching your facility? First, as a member it is always important that you are aware of who is in the parking lot. Be aware of any cars with people sitting in them that are in close proximity to your facility.
Now we need to find out risk factor in terrorists’ eyes.
Red Zones:
Terrorists seek locations to position themselves in what are referred to as red zones. These zones will normally meet the following three requirements:
1)  View of the target. Terrorists want to observe vulner­abilities so they need a good view. They will note the times of services. They will note how many people are there at any given time, seeking the opportunity to kill the maximum number possible with as little effort as possible. They will observe who comes and goes from the facility and will note the established patterns of behavior.
2)  Cover and concealment. Terrorists need to be able to apply cover and concealment tactics. While they are viewing the intended target, they do not wish to be observed by you.
3)  Safety and Exit. Terrorists do not want to be appre­hended and thus seek a safe exit which provides a quick exit, should their presence be observed.

Green Zones
As you are entering and exiting from your HOW, it is important that you are observant of suspicious activities.
Following are a few suspicious activities you might observe around your facility:
• Someone taking notes or photos who stops abruptly when approached
• Someone pointing at the target or casually looking around
• Circling the block repeatedly in a taxi or vehicle.
• Car, van, or truck parked nearby with occupants taking notes or photos.
• Circling the block repeatedly in a taxi or vehicle.
• Drawings or maps observed in a vacant car, van, or truck.
• Interest in security systems/someone enters and asks about the security system
• Someone glancing away or appearing to be nervous when approached.
• Someone enters the facility claiming to be looking for someone, and they appear overly interested in the physical layout of the building


The above listed activities may or may not indicate that your location is under surveillance. However, if observed, they should be noted and reported immediately. Another consideration as terrorist activities increase is that if law enforcement personnel are able to observe those conducting surveillance, it could result in lives being saved by collecting and sharing intelligence information. Otherwise, terrorists may move onto the next facility, which could result in many casualties. Regardless, the decision to question those conducting hostile surveillance or conduct additional surveil­lance must be made by law enforcement or a trained security team member.
Securing Worship
This part I divided into three (3) sections:
• Interior security
• Exterior security
• Procedural and/or best practices

• Interior security by
1.   Access Control:
Controlling and limiting access is one of the most important steps that can be taken to improve security. Some Worship staff and worshippers will not be comfortable with restricting access.

• Establish policies to maintain access control
• Limit access to childcare, business offices, cash counting area, and media rooms.
• Always install the latest patches and updates when prompted. This mitigates many hacking programs that rely on outdated vulnerabilities in your software. Set your computer to auto install updates.
• Doors and windows should be secured when the building is vacant.
• Limit points of access. When opening your facility, consider the event, the number of people, and the location of the event. Limit access by only opening doors that are close to the area being used. Do not open every door.
•  Establish checkpoints based on need--and staff accordingly. A checkpoint is an entry where all people and things are screened based upon the security plan for the current threat environment.
•  Keys for critical areas and master keys must be especially controlled.

2.   Burglar Alarm:
• Establish policies to maintain burglar alarm system.
• Ensure an alarm system covers access points and key areas where expensive items are housed.
• Use a reliable monitoring vendor and ensure contact information remains current.
• Develop a policy that addresses response to alarms.
• Install panic alarms at public reception areas where employees can initiate emergency procedures when suspicious persons approach and request access.

3.   Fire Alarm:
•  Ensure adequate addressable fire alarm coverage. The local fire department can help with determining what is needed for your facility.
• Develop a policy that addresses response to alarms.

4.   CCTV System:
Camera coverage should be considered for critical areas (such as areas with children, the business office, the clergy’s office, etc.) and access points. They can also be focused around items that are most likely to be stolen. For places of worship with little capital to spend, a camera with audio that can be monitored from a cell phone may be purchased for about $250 - $2500.

•  A Camera system can also serve as an alarm system by using video analytics and integrating with access control systems.
• Cameras should capture every door and point of entry. Additionally, cameras should be in the infant care rooms, daycare rooms, and areas where children play/eat/etc.
• If cameras are installed in daycare centers, inform parents and caretakers that you would be storing digital data of their children.
• Always install the latest patches and updates when prompted. This mitigates many hacking programs that rely on outdated vulnerabilities in your software. Set your computer to auto install updates.

Considering that places of worship are often targets of attacks, crime, and other losses, it is our belief that by auditing CCTV video footage as a standard operating procedure, and delivering a new powerful signage that states ‘WE CHECK CCTV EVERYDAY', far more benefits will accrue to them.

5.   Doors:
• Ideally doors should be wood or steel with a solid frame.
• Hinge pins should be located on the interior of door, or capped, if on the outside to prevent easy removal.

6.   Windows:
• Ensure that windows are secured prior to closing and latches are in working order.
• If windows are opened for air circulation, only open windows that are monitored and/or located where
people cannot climb through.

Exterior Security
Exterior security controls encourage us to think about how best to secure the perimeter of the church, parking lots, playground areas, and mass drop-off areas. Research says most violent crimes at faith-based organizations, more than 70% of the acts occurred outside the building on ministry grounds or parking lots.
• Consider enhancing perimeter security by adding a decorative fence—whether aluminium, board, stone, brick and/or multiple combinations thereof.
• Secure points of entry when no events are taking place. If your facility has back entrances and parking lots, these should be locked off.
• Remove potential fire hazards, such as trash and debris. Keep dumpsters in a locked dumpster pad.
• Consider vehicle barriers and/or bollards for vulnerable entries, special events, or in case of a terrorist threat when stand-off distance is required for vehicles. Barriers can be as simple as strategic parking of staff vehicles or as complex as a built-in place.
• Identify exterior hiding places, equipment vulnerabilities, utilities entries/shutoffs, fire department connections and hydrants. Check them for signs of activity before any event.
• Lights should be placed on all doors and windows. Motion detector lights should be considered for doors and windows. Ensure all lights are in working order.
• Lights should be on from dust to dawn. Consider lights with solar panels as this may reduce the cost of the energy.
• Larger facilities may need an officer to direct traffic. This will ensure timely entry and parking. The officer(s) can patrol the parking lots during the services. This task can also be completed by members of your “security team.” Outfit them in high-visibility vests and radios.
• Camera coverage is recommended for the exterior of the facility. Every area from the entrances to the parking lots should be covered. Some cameras only record when motion is detected, others record 24-7. Cameras can be monitored from the inside by your security team members and remotely on hand held devices as needed or based upon analytics,
• "Cameras never lie". But, how will a user ever know, unless he 'sees' what the camera 'saw'. Do audit own CCTV video footage as a standard operating procedure, for them to achieve optimal benefits from CCTV video, which includes (a) crime, fraud and loss prevention (b) faster solving of crime (c) risk mitigation (d) compliance issues and continuous improvement and so on.
• Appoint a “security leader” to oversee the development and implementation of the security plan. Schedule regular meetings to review procedures and incidents.
• Develop a “Welcoming Committee” of individuals and/or ushers who are trained in security detection and emergency responses.
• Conduct evacuation drills with staff and volunteers. Attend firearms training if your committee recommends that individuals are armed during services and special events.

"Considering that places of Worship are often targets of attacks, crime, and other losses, 'COM-SUR', the world's only CCTV video footage auditing, smart backup, and standardized intelligent reporting software is available for free to all places of Worship world-over, as part of our corporate social responsibility.

Places of Worship will need to take care of the hardware, installation, training, and so on; which can easily be carried out by their system integrators, who will need to be approved and trained by us. Besides a registration and training fee, a small consulting and administration fee will be charged by COM-SUR from the system integrator".

Resources:
Crime Prevention for Houses of Worship, 2nd edition, by Paula L. Ratliff. Published by AISIS International, 2015.
https://www.ifsec.events/india/visit/news-and-updates/com-sur-will-be-integrated-ai-ml-technologies-offer-holistic-solutions
https://timesofindia.indiatimes.com/city/agra/kasganj-cctv-cameras-to-be-set-up-at-worship-places-in-sensitive-areas/articleshow/62823320.cms
https://www.newindianexpress.com/cities/bengaluru/2019/apr/26/police-top-brass-meets-heads-of-places-of-worship-malls-1969148.html
https://defendry.com/4-ways-to-improve-security-at-your-place-of-worship/