Making the case - Providing confirmation of an actual intrusion

Making the Case

Providing confirmation of an actual intrusion

Making the CaseIn December 2013, the city of Akron, Ohio made the decision to implement new protocols that emphasized the adoption of verified alarms in regard to dispatching police to the properties of possible intrusions. Akron police officials indicated that the change in policy was in direct correlation with the estimated 10,000 alarm calls they had received in the previous year and the tens of thousands of alarm calls they received in the years prior.

Cities like Detroit, Salt Lake City and Las Vegas have similarly taken notice of the advantages of verified alarms, which use live audio and/or video monitored by a trained operator. This new era ushered in by alarm verification is able to not only provide confirmation that an actual intrusion is taking place within a given property, but it is also able to provide a level of detail regarding the circumstances of an intrusion that police dispatchers can qualify as actionable intelligence.

Today, technology facilitates change in real time. We live in the information age—an age of verified social media accounts—so that we can confirm the identity of a real person and use a verified payment system to confirm that we’re conducting business with a real merchant. So, what’s wrong with a verified approach to security?

A Case for Verified Alarms

Now, to clarify, I am not advocating policies for police to dispatch only to calls from verified alarms, as they have done in Akron. But why not embrace technology that allows the security industry to do a better job at significantly reducing false alarms, and more importantly, helping law enforcement to catch more bad guys? As the owner of a security company that provides both traditional and verified alarms, I can attest that while traditional alarms are still an effective way of deterring potential intruders the benefits of verified alarms are undeniable.

When Akron Police responded, two officers at a time, to thousands of alarm calls—almost 28 per day—they recognized not only the benefit, but often the necessity, given the inherent danger associated with their job, of having detailed information about what’s on the other end of those calls. The technology and infrastructure of verified alarms exists to be able to provide a greater, more accurate flow of information. This enables police officers to strategize a safer and more tactical approach to protecting a property and apprehending intruders when dispatched.

The Truth behind False Alarms

Beyond the added intelligence that verified alarms afford police officers when strategizing safer and more effective responses to real intrusion events, verification is also able to deliver practicality of another kind altogether: the minimization of false alarm dispatches.

When Akron police officials presented statistics that furthered their reason for prioritizing responses to verified alarm calls, it was explained that of the roughly 10,000 alarm calls received in the previous year, 9,850 of them turned out to be false. City officials estimated that Akron’s 98.5 percent false alarm rate costs taxpayers $200,000 annually. And Akron is not alone.

When last publicly addressed by the Department of Justice (DOJ), the status of the false alarm issue in the United States could only be described as shocking. In 2007, the DOJ’s Office of Community Oriented Policing Services (COPS) published a thorough report on the issue in a problem-specific guide for police, False Burglar Alarms. This report found that throughout the country, local law enforcement agencies dispatch officers to at least 36 million alarms annually, between 94 and 98 percent of which are false. The DOJ concluded that each year this costs taxpayers over $1.7 billion and that the typical security alarm’s reliability is generally between only two and six percent.

Today, with the technology and infrastructure of verified alarms, police officers can confirm that they’re responding to a real emergency and accordingly prioritize their responses. One effective false alarm reduction tool, Enhanced Call Verification (ECV), also known as two-call verification, is often misunderstood as a method of true alarm verification. Without using advanced technology like live audio or video, ECV cannot confirm an in-progress intrusion and will not drive a priority alarm response from law enforcement.

Results of “Crying Wolf”

When such a high percentage of all alarm calls turn out to be harmless, it’s hardly reasonable to expect a response to be treated with the same level of urgency afforded to a detailed description of a breakin provided via a verified alarm.

Here’s an analogy: Think about how you would respond to hearing a car alarm. Probably, like me, you would do nothing. But, if you saw somebody breaking into a car, you would surely take the action of calling the police.

Unfortunately, false alarms inherently lower the level of urgency and caution in which all alarms are responded to, detracting from the two percent of the time that an alarm is genuine. When law enforcement receives a call from an alarm that uses verified, real-time information regarding a very real situation, they know what they are walking into.

Standards for Priority Response Alarms

Contrary to a common misconception, advocates of priority response for verified alarms in municipalities across the country, such as the DOJ, are not saying that they will no longer be responding to burglar alarms. Through the implementation of alarm verification standards, what is in fact being expressed is the belief that today there exists the capabilities, products and services to deliver greater results. With the advent of verified alarms, there now exists the expectation and realization that the industry can improve that success rate.

So, what exactly are the standards for security alarms being given priority response? It’s right there in the name: verified intrusion alarms.

There are some general criteria for what actually qualifies as a “verified alarm.” The general theme is that a live human—not a motion sensor or door contact only—is involved in the dispatch process in one way or another. Verified alarms provide confirmation of an actual in-progress intrusion to a police dispatcher, while operators at verified monitoring stations are trained to quickly assess live audio and/or video to confirm the reality of an in-progress intrusion.

Confirmation of an in-progress intrusion is an extremely high police dispatch priority, eliciting an immediate response, which far more frequently results in an apprehension.

Alarm verification by an operator is essentially the same process as when someone reports an in-progress intrusion with an eye-witness account. This method of verifying an emergency situation is associated with the same priority as panic buttons and hold-up alarms, eliciting immediate police dispatch.

In 2014, an era of rapid progression and advancement of technology throughout industries of all kinds, priorities should be placed on technology that can better ensure and promote the safety of the public and law enforcement dedicated to their protection. It’s only fitting that with new technology, now is the time to embrace verified alarms and priority alarm dispatch. To do this is to embrace technology and practices that are safer for police, customers and the public, allowing security companies to do a better job lowering the false alarm rate, and ultimately, promoting the alarm system’s primary function—the apprehension of criminals.

This article originally appeared in the July 2014 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3