Deterrence or Arrests

Checking the value of consumer alarms

Every month, more products pour into security magazines and catalogs. We see a torrent of innovation and evolution continually adding features and reducing costs along the way.

We need to step back from the tsunami of progress and ask, “So what?” What is the purpose of all this effort? Is there some technical nirvana we can bask in when we finally reach 100 megapixels, or ultimate peace when mesh networks consume our geography? Or is it all simply a pointless game of live fast and die? It is time to step back and consider the true goal.

I am talking specifically about intrusion alarm systems. Amid this continuing flood of technology now delivering wireless sensors, cell communications, radio backups and integrated video, we need to take a breath and ask ourselves, “What is an intrusion alarm for, and where is the value to the consumer?”

We must understand both the function and goal of an intrusion alarm before we can evaluate the value of new technology for our customers. The function of an intrusion alarm is to detect intruders and notify authorities, but the value of the alarm to the consumer depends upon the response of police. Ultimately, is the goal of intrusion alarms simply deterrence, or is it actual arrests?

Catching the Bad Guys
While the basic detect/notify function remains unchanged, the goal of intrusion alarms has evolved over time with changes in technology. Initially, intrusion alarms were designed to catch criminals. The early systems used hardwired McCullough circuits with a maximum range of 30 miles.

All monitoring was local, and alarm companies worked closely with their local police force. These expensive systems were only installed in places of greatest risk, such as banks and telegraph offices. Detection consisted of breaking a simple circuit, usually with a switch at a door or window. These silent systems had no siren to scare off the intruders because the goal was a red-handed arrest.

The consumer electronics revolution began with the invention of the transistor, which gave rise to a new generation of affordable detectors. These new sensors detected motion and even the sound of glass breaking. But at the same time, communications evolved and automated switches replaced humans as telephones became standard equipment in homes and offices. Intrusion alarms also embraced new lower-cost communications -- first using a tape dialer and then, as phone networks evolved, the digital dialer in 1972.

This quantum leap in communications meant that the notify component of intrusion alarms could scale, and it became affordable to a mass market.

Detection and notification exploded into mainstream America, pushing millions of systems into small businesses and the homes of residential consumers.

The Move to Deterrence
While the basic function of detection/ notification did not change, the goal of intrusion alarms began to evolve from arrests to deterrence.

False alarms and imperfect detectors led to high false alarm rates, which became a growing issue for police. The industry tried to improve detection technology and the accuracy of an alert by calling property owners before notifying police of an alarm.

The goal of intrusion alarms went from delivering arrests to deterrence. Sirens were added to system designs, and salespeople began selling deterrence as the key feature. This made a security company’s yard sign the most valuable part of a security system.

Battle for Response
The threat of an arrest is the source of deterrence. With the proliferation of systems, law enforcement’s perception of intrusion alarms began a shift from partner to adversary as they dedicated more resources to responding to alarm dispatches. At first, the industry softpedaled the issue.

In the early 1990s, the International Association of Chiefs of Police proposed non-response as a nationwide option to what they believed to be the growing burden of alarm response.

This transition away from response was a threat the industry could not ignore, and it began taking action at several levels, including the Electronic Security Association, to pursue evolutions in detection and notification to reduce alarm dispatches sufficient to maintain police response.

The ESA transitioned this effort to the coordinated alarm reduction effort that ultimately culminated in the creation of Security Industry Alarm Coalition in 2003 with dedicated full-time staff to drive evolution in products and processes and reduce alarm dispatches.

Improvements in detection targeted both the detectors and the hardware and operation of security panels, including creating the CP-01 standard.

SIAC drove improvements in notification that also were important including ECV, placing two phone calls before notifying police, which delivered huge reductions in alarm dispatches. These efforts by the industry were overwhelmingly successful in maintaining police response, with only a few exceptions.

Deterrence to Arrests
The value of deterrence stagnated as consumers and law enforcement came to grips with the reality that law enforcement resources simply cannot provide an immediate response to every alarm. Response times grew to a point that they were threatening the value of deterrence. The political discussions between industry and law enforcement on alarm response has shifted from an all or nothing battle of non-response to creating tiers of response, giving different alarms different priorities.

Security companies are embracing this more liberal stance. Some states, like Colorado, have implemented policies with a tiered response. In most of the state, the response to an alarm is broadcast and file, which means that the police dispatcher announces the alarm over the radio and any police in the area have the option to respond if they choose to do so.

If, however, the alarm is verified with video or an actual eyewitness, an officer is assigned to respond with the goal of arresting the intruder. Similar prioritization of alarms is already in place across the country in dispatch centers run by police and sheriffs.

The obvious goal, from law enforcement’s perspective, is a return to arrests.

This approach gives highest priority to alarms that will most likely result in an arrest -- because crimes in progress receive a higher priority response. Now a new generation of technology offers video alarms.

These new alarm systems still follow the pattern of detect/notify but go a step beyond and deliver a short video clip confirming what was detected.

This video confirmation moves the responses to a higher priority, creating new value for the security industry and delivering greater life safety to the consumer.

Prioritizing alarm response is a natural evolution toward more arrests and greater deterrence -- and you can’t have one without the other.

This article originally appeared in the issue of .


  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

  • Live From ISC West 2023 Preview

    Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • A Break from Routine

    A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3