Making the case - Providing confirmation of an actual intrusion

Making the Case

Providing confirmation of an actual intrusion

Making the CaseIn December 2013, the city of Akron, Ohio made the decision to implement new protocols that emphasized the adoption of verified alarms in regard to dispatching police to the properties of possible intrusions. Akron police officials indicated that the change in policy was in direct correlation with the estimated 10,000 alarm calls they had received in the previous year and the tens of thousands of alarm calls they received in the years prior.

Cities like Detroit, Salt Lake City and Las Vegas have similarly taken notice of the advantages of verified alarms, which use live audio and/or video monitored by a trained operator. This new era ushered in by alarm verification is able to not only provide confirmation that an actual intrusion is taking place within a given property, but it is also able to provide a level of detail regarding the circumstances of an intrusion that police dispatchers can qualify as actionable intelligence.

Today, technology facilitates change in real time. We live in the information age—an age of verified social media accounts—so that we can confirm the identity of a real person and use a verified payment system to confirm that we’re conducting business with a real merchant. So, what’s wrong with a verified approach to security?

A Case for Verified Alarms

Now, to clarify, I am not advocating policies for police to dispatch only to calls from verified alarms, as they have done in Akron. But why not embrace technology that allows the security industry to do a better job at significantly reducing false alarms, and more importantly, helping law enforcement to catch more bad guys? As the owner of a security company that provides both traditional and verified alarms, I can attest that while traditional alarms are still an effective way of deterring potential intruders the benefits of verified alarms are undeniable.

When Akron Police responded, two officers at a time, to thousands of alarm calls—almost 28 per day—they recognized not only the benefit, but often the necessity, given the inherent danger associated with their job, of having detailed information about what’s on the other end of those calls. The technology and infrastructure of verified alarms exists to be able to provide a greater, more accurate flow of information. This enables police officers to strategize a safer and more tactical approach to protecting a property and apprehending intruders when dispatched.

The Truth behind False Alarms

Beyond the added intelligence that verified alarms afford police officers when strategizing safer and more effective responses to real intrusion events, verification is also able to deliver practicality of another kind altogether: the minimization of false alarm dispatches.

When Akron police officials presented statistics that furthered their reason for prioritizing responses to verified alarm calls, it was explained that of the roughly 10,000 alarm calls received in the previous year, 9,850 of them turned out to be false. City officials estimated that Akron’s 98.5 percent false alarm rate costs taxpayers $200,000 annually. And Akron is not alone.

When last publicly addressed by the Department of Justice (DOJ), the status of the false alarm issue in the United States could only be described as shocking. In 2007, the DOJ’s Office of Community Oriented Policing Services (COPS) published a thorough report on the issue in a problem-specific guide for police, False Burglar Alarms. This report found that throughout the country, local law enforcement agencies dispatch officers to at least 36 million alarms annually, between 94 and 98 percent of which are false. The DOJ concluded that each year this costs taxpayers over $1.7 billion and that the typical security alarm’s reliability is generally between only two and six percent.

Today, with the technology and infrastructure of verified alarms, police officers can confirm that they’re responding to a real emergency and accordingly prioritize their responses. One effective false alarm reduction tool, Enhanced Call Verification (ECV), also known as two-call verification, is often misunderstood as a method of true alarm verification. Without using advanced technology like live audio or video, ECV cannot confirm an in-progress intrusion and will not drive a priority alarm response from law enforcement.

Results of “Crying Wolf”

When such a high percentage of all alarm calls turn out to be harmless, it’s hardly reasonable to expect a response to be treated with the same level of urgency afforded to a detailed description of a breakin provided via a verified alarm.

Here’s an analogy: Think about how you would respond to hearing a car alarm. Probably, like me, you would do nothing. But, if you saw somebody breaking into a car, you would surely take the action of calling the police.

Unfortunately, false alarms inherently lower the level of urgency and caution in which all alarms are responded to, detracting from the two percent of the time that an alarm is genuine. When law enforcement receives a call from an alarm that uses verified, real-time information regarding a very real situation, they know what they are walking into.

Standards for Priority Response Alarms

Contrary to a common misconception, advocates of priority response for verified alarms in municipalities across the country, such as the DOJ, are not saying that they will no longer be responding to burglar alarms. Through the implementation of alarm verification standards, what is in fact being expressed is the belief that today there exists the capabilities, products and services to deliver greater results. With the advent of verified alarms, there now exists the expectation and realization that the industry can improve that success rate.

So, what exactly are the standards for security alarms being given priority response? It’s right there in the name: verified intrusion alarms.

There are some general criteria for what actually qualifies as a “verified alarm.” The general theme is that a live human—not a motion sensor or door contact only—is involved in the dispatch process in one way or another. Verified alarms provide confirmation of an actual in-progress intrusion to a police dispatcher, while operators at verified monitoring stations are trained to quickly assess live audio and/or video to confirm the reality of an in-progress intrusion.

Confirmation of an in-progress intrusion is an extremely high police dispatch priority, eliciting an immediate response, which far more frequently results in an apprehension.

Alarm verification by an operator is essentially the same process as when someone reports an in-progress intrusion with an eye-witness account. This method of verifying an emergency situation is associated with the same priority as panic buttons and hold-up alarms, eliciting immediate police dispatch.

In 2014, an era of rapid progression and advancement of technology throughout industries of all kinds, priorities should be placed on technology that can better ensure and promote the safety of the public and law enforcement dedicated to their protection. It’s only fitting that with new technology, now is the time to embrace verified alarms and priority alarm dispatch. To do this is to embrace technology and practices that are safer for police, customers and the public, allowing security companies to do a better job lowering the false alarm rate, and ultimately, promoting the alarm system’s primary function—the apprehension of criminals.

This article originally appeared in the July 2014 issue of Security Today.

Featured

  • Survey: 84 Percent of Healthcare Organizations Spotted Cyberattack in Last 12 Months

    Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security professionals globally and recently released findings for the healthcare sector based on the data collected. It reveals that 84% of organizations in the healthcare sector spotted a cyberattack on their infrastructure within the last 12 months. Phishing was the most common type of incident experienced on premises, similar to other industries. Read Now

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West
  • Study: Video Doorbells Have a 71% Service Attach Rate

    Parks Associates recently announced a new white paper, Consumer IoT Product Development: Managing Costs, Optimizing Revenues, which provides companies with a business-planning blueprint to evaluate how a consumer IoT solution will perform across its lifetime. Subscription services, such as video storage and professional monitoring, can be critical for covering ongoing cloud and support costs Read Now

  • Michigan City Fights Retail Crime With AI-Powered Video Surveillance, 911 Camera Sharing

    To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3