Fieldwork and feedbacks

Site monitoring

Services of remote video monitoring of objects

Information and
Analytical Department
 


opportunities

The security services company "ASB" (OP "ASB") carries out its activity in strict conformance to the Law of Russian Federation "On private detective and security activity". Wehaveastatelicenseforallouractivities. OP "ASB" providesthefollowingrangeofservices:

  • Personal security: bodyguard services; driver-bodyguard; bodyguard escort for VIP persons; escorting and protection for foreign tourists (individually and groups);
  • Property protection: enterprises, organizations and companies, currency exchange offices, trade enterprises, terminals and places of vehicle storage (parking lots, garages, vehicle service stations, fuel filling stations); residential buildings, entrance halls, entrances to apartment blocks, cottages. Guardingcanbearmed, withservicedogs;
  • Property protection during transportation: within the limits of city; throughout Russian Federation territory;
  • Public order maintenance at mass events venues:
  • Consultancy and recommendations for clients on legitimate protection from illegal encroachments;
  • Designing, installation and service maintenance of security and fire alarm system, sound and video surveillance systems, access control systems etc.
  • Security service management  

By ordering this service you will get:

  • Collective management (managements is exercised not by a single security service specialist but by a group of highly qualified professionals that have more considerable and broad experience of problem solving in the field of corporate security);
  • Division of legal responsibilities for performer’s actions (head of an enterprise can be made liable for illegal action of a staff security official);
  • Competitive price (contract cost is comparable with a salary of one staff security specialist);
  • The best tool of control and motivation for contractors’ and personnel performance;
  • Efficiency (motivation of our work through bonuses system for expenses and losses minimization);
  • Experience of our company specialists, their contacts and ties and opportunities;
  • Confidentiality (maximum protection of obtained data and information);
  • Effective investigation of causes of loss occurrence with further preparation of evidentiary foundation and transfer of materials to law enforcement bodies;
  • Systemization of processes of business protection from outsider and insider threats; 

 

 

 

SITE GUARDING

Types of stationary objects

The largest group of guarded sites are stationary and mobile (but stationary fixed) objects that are leased or owned by joint-stock companies or private firms.

Guarded stationary objects can be classified in a following way:

  1. By size of an object, its square area:

    а) small size objects (below 100 sq. m.) - apartments, small offices, free standing vending kiosks and booths, trade outlets located in additions to buildings (for example, in one of archways of administrative or residential building), in former service premises etc.;

    b) medium size objects (from 100 to 500 sq.m.) – large apartments in buildings with improved layout, private houses with outbuildings and subsidiary plot, free standing or adjoining other buildings offices together with warehouses and production premises, large-size currency exchange offices, small commercial banks, parking areas with  capacity up to 50-60 vehicles etc.

    c) large stationary objects (from 500 to 4000 sq.m.) – medium-size enterprises with number of employees up to 300-400 people, products storage bases, large parking lots, warehouses etc.;

    d) very large stationary objects (over 4000 sq.m.)
  2.  By work schedule of  object’s personnel:

    а) objects with personnel working in one shift;
    b) objects with two-shift schedule;
    c) objects that work around-the-clock.
  3. By location area of a guarded object:
    а) objects located outside of the main industrial, production or guarded area, for example, company warehouse at railway station, raw materials warehouse (for example, wine materials) on approach route to an enterprise;

    b) objects located in free standing buildings or occupying part of other premise or territory, for example, several rooms or apartments in a house, a floor or a wing in a building, part of trade fair territory):
       - in production area; 
       - on guarded territory or near guarded territory;
       - next to crime-prone objects (markets, restaurants, beerhouses, railway station buildings).
  4. By technical resistance of an object against burglary:

    а) very well secured objects that practically do not have vulnerable points;

    b) well secured objects that have few vulnerable points that are known and controlled by security officers;
    c) weakly secured objects with many vulnerable points many of which are not controlled by security guards.
  5. Bysecuritytype:

    a) objects with simple security type (periodical guard tour around the territory without use of firing weapons and special means);

    b) objects with complex security type (staff security employees use special means and service dogs, part of the premises are connected to central surveillance console);

    c) objects with combined security type (vehicles are used for object patrolling, security guards are equipped with firing weapons and special means, they use dogs, the most important premises are equipped with video control systems).

This classification can be used to define cost of private security services, for forecasting criminal situations at an object. It is also important to take into consideration types of commodity and material located at an object, object suitability for guarding.

 

Elements of objects technical protection

Elements of technical protection of objects are:

  1. 1. Meansofcommunication. They must provide for communication both inside and outside of a guarded object. In order to avoid unwished contacts of security guards with criminal elements the guard posts within an object must be equipped only with intercommunication with a security shift supervisor (or with a guard commander). But if there is only one guard post at a guarded site it should be equipped both with intercommunication with sections or departments of an enterprise (organization) and external communication. Negative contact of security guards over telephone can be avoided to a significant extent by using radio communications at an object, as it is easier to control conversations on its channels. 
  2. 2.Meansofvideosurveillance. They help to control entry to an object and exit of people and vehicles; individual persons at an object are selectively monitored, inside premises are monitored (including closed rooms).
  3. 3. Means of security and fire alarm. For costs reasons security and fire alarm is often combined to one unit and serves for alarm initialization outside of working hours at penetration attempts or in case of fire break-out at guarded objects.
  4. 4. Lighting at a guard site. Sufficient lighting at a guarded site enables security guards to control not only its territory but also adjacent area. Correctly installed electric-lighting equipment should ensure movement of a security guard that remains nearly invisible for an outside observer. First of all the lighting should make visible not the route of a guard tour, but an adjacent territory in order not to make a security guard a live target.
  5. 5. Perimeter fencing.
  6. 6. Closed security zone. Closed security zone can be located both around the perimeter of a guarded site and inside it, around restricted access areas. Closed security zone can be controlled by service dogs as well as by means of various electrooptical sensors, ultrasound detectors, capacity sensors and radio-wave sensors.
  7. 7.Lockingdevicesandlocks. Locking devices and locks used at a guarded site must ensure tight closure of doors and possibility of correct seal placement.
  8. 8.  Entrycheckpoints(ECP). ECP at guarded sites are arranged for passing of people, motor vehicles, railway vehicles and platforms. ECP must be equipped with a “revolving gate” with a locking mechanism, and doors should be equipped with locks remotely operated from a guard post.
  9. 9. Specially equipped places for security guards location. These include: a) watchtowers; b) watch houses; c) shelters and enclosures for discreet surveillance of a site and adjacent area and for ambush during detention of unauthorized persons that have intruded into a site.

Being a key condition for site guarding effectiveness site’s technical resistance directly influences criminogenic environment at an object, especially when there are significant commodities and materials available. Technical resistance and number of intrusions into a guarded site are proportionally dependent.

* * *

  • situational thieves and robbers that use only the most favorable situation (safe for them) to commit a crime;
  •  professional offenders committing thefts and robberies at their own discretion based on the possibility of profit-making from stolen property sale;
  • offenders fulfilling an order for company’s property damage.

The first two categories of offenders will in most cases abandon their plan in the presence of security at a site. This is not an obligatory rule, but in practice there can be seen a direct relation between absence of security at a site and number of property crimes committed at it. And only that offender that fulfills an order of inflicting of harm to a company is obliged to bring it to an end and accomplish the intended crime in all the circumstances.

Procedure for taking stationary objects under guarding

Secure and reliable guarding is impossible without close cooperation of a company with a security service company or availability of company’s own security service.

Immediately prior to activation of security system at an object there should be no unauthorized persons staying in its premises. Checking this condition is responsibility both of security services company’s clients and security service.

A client should also make sure that in the premises that are turned over for guarding electrical and gas appliances are switched off, windows are latched, doors are locked (with further hanging of seals condition of which must be checked by security guards). Samples of goods and materials should be removed from showcases in shops and tailor's workshops for less drawing of attention of hooligans and situational (occasional) criminals. If goods and materials stay yet still in showcases an inventory should be made up, signed by client and sealed with company’s seal. The inventory together with shift handover register and other documents are kept at guard post.

The premises that are turned over for guarding, their roof, ceiling, walls, windows, floor (if there is a basement with gable windows) and doors must be in good order. Ground floor windows should be equipped where possible with metal grating or shutters with latches. Lighting of an object and adjacent territory should be sufficient to allow for visual control during hours of darkness.

Special attention should be paid to strengthening and refitting of cash desks and safety vaults premises where especially valuable goods are kept. Higher requirements are imposed on these premises. They are as follows:

a) cash desks and safety vault premises must be isolated from other service and utility rooms;

b) in multistory buildings cash desks and safety vault premises must be located on mezzanine floors, in double-story buildings – on the upper floor;

c) in single-story premises the windows of cash desks and safety vaults must be equipped with metal shutters (internal) or walled up with brickwork, doors should be metal or  metal sheet-covered on both sides;

d) cash desks and safety vaults should have bearing walls, strong ceiling and floor structure, and also robust inside walls and partitions;

e) on the inside of premises, in places where intrusion from outside is possible (window openings, vents, ventilation ducts and shafts, thin partitions etc.) it is necessary to put metal gratings;

f) these premises must have safe deposits for safekeeping of money and valuables that are secured to walls and floor;

g) cash desks and safety vault premises should be blocked by security alarm with signal transferred to the desk of duty security shift, at entry control point of a guarded object etc.;

h) in cash desks and safety vault premises measures shall be taken to prevent the use of  electric drilling and electric cutting equipment by criminals during intrusion into a guarded object.

Thesemeasuresinclude:

  • use of low-voltage current for lighting of cash desks and safety vault premises (24,36 V);
  • fitting of flush-type sockets and switches in cash desks and safety vault premises, location of which is known only for people responsible for company safety and  a cashier (responsible for money and valuables storage);
  • electrical installation that ensures that sockets and lighting are powered from a next door room that is isolated from cash desk of from a room where duty security shift is sitting.

Stationary objects guarding tactics

Security protection of stationary objects is a complex of security measures, largely of preventive nature. In fact, effective guarding is security guarding that does not allow criminals to find a loophole in the security system or creates an opportunity for suppression of criminal activity in very early stages.

The main components of stationary objects guarding tactics are:

  1. Security regime at an object.
  2. Used tactical techniques.
  3. Special skills of security guards that create conditions for the use of various tactical options and techniques and technical security equipment. Among the factors that affect selection of security techniques and options are:

    a) possible ways of criminal intrusion into a guarded site;
    b) characteristics of technical resistance of a guarded site;
    c) availability or absence of security and fire alarms at a site;
    d) presence of vulnerable points in technical resistance of a site;
    e) terrain conditions where a guarded site is located, and also object’s constructional features;
    f) work schedule and  mode of operation of a guarded object, its technological characteristics, valuables available at an object;
    g) security system used at a site;
    h) quantities and qualitative characteristics of guard forces;
    i) armament and technical equipment of security guards, availability of motor vehicles, communications means, special means.

Underestimation of factors that impact object guarding tactics, neglecting by security guards of existing vulnerable points results in negative consequences and leads to a legal claim from clients.

Security regime can be round-the-clock, partial (certain hours) or selective. Depending on the quantity of used forces and means, territory and object control density, security regime can be divided into simple and increased security. On a significant part of guarded sites security guards stay twenty four hours. During the daytime they control visitors entering the object, carry out access control arrangements, and at night they carry out closed guarding of the object assuming full responsibility for its preservation. Therefore, an additional ground for classification appears that differentiate between open and closed security regime at a site.

Someobjectsareguardedonlyoccasionally, thatisselectivelybytime. Such objects include apartments that are guarded during the period of landlord’s departure or absence, temporary storages or territories at a time of commodities and materials delivery, premises they are guarded mainly in the evening hours.

 

In practice two groups of object’s security regime tasks are distinguished:

  • analytical and preventive tasks;
  • procedure -repulsion tasks.

Analytical tasks are completed by means of information collection about criminals and the state of own security regime. The most important here is observance of the principles of information collection continuity and consistency.

Completion of preventive tasks is primarily related to creation of image of reliable security regime. Such image can be created by series of simulation arrangements that demonstrate “failed” attempts of encroachment on an object and strong and vigorous countermeasures of security. All this can be supplemented by impressive demonstration of security regime elements (imposing security guards, advanced security alarm, on-site availability of police). Criminal attempts of encroachment on a guarded object can be also prevented by its disguising, closing information channels about its activity and by misinforming competitors and criminal elements concerning kind of activity, form of ownership, state of security regime, volume of commodities and materials available at an object.

The second group of security regime tasks is completed by timely detection of signs of imminent encroachment and its further repulsion by preprepared forces and means. As a rule, such actions (operation) should be taken in cooperation with internal affairs bodies officers that will have opportunity to timely record criminal activity traces. In cases when it is difficult to predict the time of encroachment it makes sense in certain cases “to prompt” criminals to actions. This can be achieved by misinforming of criminal elements about the time and place of valuable commodities or substantial sum of money delivery.

* * *

Security regime of an object is to a wide extent characterized by set of duties and responsibilities of security staff. When taking an object under guarding and during the guarding a security guard is obliged:

  • attend briefing wearing clothes adequate for the season;
  • receive weapons or special means, check their serviceability, with observance of safe handling rules;
  • arrive to an object in due time within a security shift;
  • together with guarded object’s administration representative (during taking from him an object under guarding or in case of object’s handover) or together with a coming off duty security guard (a shift supervisor) inspect and check an object that is taken under guarding;
  • check locks, locking device and seals;
  • check security and fire alarms, lighting and telephone connection;
  • check availability of emergency fire-fighting equipment;
  • make an entry in duty handover logbook including information about existing drawbacks of an object and breaches of security;
  • in case of absence of a coming off duty security guard and in the presence of unsafe conditions and breaches at an object that does not allow to take it under guarding, immediately contact security service company management and take further actions in accordance with their instructions;
  • if instructions are given to take an object under guarding with breaches of security they should be given in writing or in the presence of the whole security shift;
  • during performance of his duties of site guarding a security guard (security shift) should always stay at post, periodically (in accordance with the established schedule) patrol the territory or premises of the guarded object, check the state of window gratings, doors, observes light and acoustic signals of security and fire alarms;
  • in case of alarm actuating immediately inform security service company operator and duty officer of territorial body of foreign affairs;
  • with observance of safety rules determinate the cause of alarm actuation and take measures for detention of criminals only if these actions do not undermine object’s security regime;
  • actively cooperate with security guards at nearby posts or guarded sites, render assistance to them as much as possible without prejudicing the guarded object’s security regime. [In this respect it is useful to use an old, well-tried remedy – a whistle. Whistle signals: two long signals - “help”, one short signal – response and readiness for help; one long signal - “detain”. List of such commands is not limiting and should be expanded by development of signals-passwords used at changing of guards at posts, signals that help to identify one’s colleague during hours of darkness...]

* * *

It is forbidden for a security guard when performing his functional duties at an object:

  • take under guarding objects that are not stated in a contract, a special order for guards, a guard report;
  • on his own initiative or upon request of site administration open or close locks, locking devices, doors, windows, place or remove seals;[In case this is required by business need (delivery of goods, unscheduled shipment), an object’s unsealing (sealing) act is drawn up, an entry is made in the guarding logbook.]
  • move fire-fighting equipment and use it for other than the purpose specified;
  • perform works not related to object guarding (loader, carrier, cleaner);
  • allow somebody’s access to an object without securing approval of company management, administration of a guarded site, an operator of private security agency or his supervisor;
  • pass over to anybody his weapon and special means, except for a person responsible for storage and issue appointed by the order of a head of security agency with corresponding note made in the book of receipt and issue of armament and special means;
  • switch off signaling devices, self-contained alarm system, lighting at an object, also in the event of alarm actuation;
  • leave a post (an object) or distract from guard duty, sleep at a post;
  • on his own initiative pass over guarding of object to other people including close relatives.

* * *

When putting out post the following should be ensured:

a) the fullest possible control of a guarded building, premise or territory (terrain);
b) possibility of visual control by one post guard of at least part of next post territory;
c) possibility of mutual help and cooperation of neighboring posts;
d) communication of security guards with each other and with a shift supervisor.

In guarding practice two types of posts are used: static security post and inspection checkpoint. On areas of significant length security guards use bicycle, motorcycle or vehicle patrol.

A static security post is a post at which guarding is carried out of one isolated object or several objects on open area or fenced territory, if total length of its guard tour does not exceed 150 meters.

In guarding practice one should use both open and closed static security posts, that is such posts where security guards are not seen from the side of territory that is neighboring or adjacent to a guarded site.

An inspection checkpoint is a post at which guarding of one or several objects is carried out by patrolling of them, if total length of its guard tour is over 150 meters but does not exceed 1500 meters.

In guarding practice the following control and inspection techniques are implemented;

  1. Frontal inspection of an object during which several guards move in one direction until the guarded object’s boundary, and then move backwards.
  2. Object inspection towards each other, when guards move from object’s boundary to its center (meeting point), from where they move again towards the site perimeter.
  3. Concentrical and eccentrical control and inspection of object, where one or two security guards move on a spiral path from the center of guarded territory towards periphery  and backwards.
  4. Sequential inspection of separate sections of the guarded object along complex trajectory depending onsite layout and construction.
  5. Random inspection of object’s areas depending on value of commodities and materials stored at site, availability of vulnerable points at a site.
  6. Movement at an object with constantly changing route is applied in complex situations in order to prevent attack against a security guard.
  7. Movement at an object with temporary stops and inspection of vulnerable points and other areas from a closed post (from ambush).

* * *

Correct tactics of site guarding, optimal frequency of its patrolling and inspection, professional vigilance to a large extent ensure proper level of security. These seemingly simple things need no comment and should not give rise to doubt. Butsecuritypracticesuggestsotherwise. Security requirements are nearly always violated.

Alarm means in stationary objects security systems

Nowadays alarm means are very widely used for site guarding. Depending on alarm type they are divided into:

  • security alarm means;
  • fire alarm means;
  • alertingalarmmeans.

At a number of sites security alarm and fire alarm are combined into one system for costs reasons. This system is called security and fire alarm system.

Security and fire alarm system is designed for alarm signals initialization during guarding hours (nonworking hours at penetration attempts or in case of fire break-out at guarded objects.

Alerting alarm is designed for alarm signals initialization at robberies against saving banks and other objects and is activated by personnel by actuating secret sensors (buttons, pedals).

Alerting alarm and security and fire alarm system are subdivided into self-contained (autonomous) and centralized alarm systems. Self-contained alarm system is designated for initialization of local acoustic and light alert signals in authorized person’s room, in the premises of public organizations and institutions. Centralized alarm system is designated for generating of alert signals on devices installed in the premises of access control points, policed office or centralized security station.

Security alarm system consists of:

  • detecting devices - sensors;
  • information transmission facilities – communication channels;
  • information reception and processing equipment;
  • sources of light and acoustic signals.

A sensor is a device installed at a guarded site that directly intercepts information about an object’s state and transforms it into a value suitable for transmission over communication channel. Information transmission facilities provide for information transfer from sensor to reception equipment. As information transfer channels from guard sites the following systems are used:  exchange telephone lines of local exchange networks, wire broadcasting lines, power supply lines, specially laid cables, and also radio communication channels.

Information reception, processing and retrieval equipment provides for receipt of information about an object’s state and processing of results and delivers operation information about type, location and time of violation if any.

Sources of light and acoustic signals serve for initialization of alarm signals when information is received about security violations at a guarded site.

Electric lamps, loud rings and siren are used as sources of light and acoustic signals.  

Operation principle of security alarm is as follows. With the help of sensors windows, vent panes, doors, glass openings and other places of possible penetration at an object are blocked (protected). Sensors are installed in such a way as to ensure that at penetration attempt of unauthorized people at a guarded site (that is at the moment of doors or windows opening, glass breakage etc.) the normal state of these sensors will change. Certain sensors are interconnected by conductors and are connected to information reception and processing equipment. Series-connected sensors together with connector strips make an electric circuit called a loop line. At the attempt of offender’s penetration at a site the state of one or several sensors is changed which results in site blocking breakage: electrical circuit (a blocking loop) is either opened or closed (depending on type of sensors installed), security alarm goes off and produces an alert signal.

For increased security reliability of the most important objects (banks, cash desks, weapon storages) alarm systems are installed with several borders, for example, first border – outside perimeter, second – places of possible penetration to an object (doors, windows, vent panels etc.), third – internal premises, forth – specific guarded items (safe boxes, cases, lockers etc.). Each border is obligatory connected to an independent unit of control and indicating equipment to ensure that if an offender bypasses one of the borders an alarm signal will be produced from the other border.

By operating principle sensors are divided into the following types: electromechanical, thermal, capacity, ultrasonic, electrooptic, microwave. As means of information detection about guarded site’s blocking breakage, sensors define security alarm possibilities and site security reliability. This explains extremely stringent requirements imposed on them, and also continuous improvement of the existing constructions and designing new constructions.

Operating principle of electromechanical sensors is based on reception of mechanical effects created by an offender and transformation of these effects into electric circuit parameters changes. The simplest sensors from this group are direct contact sensors that cause direct closing or opening of electric circuit once activated. These sensors are pressure-activated switches (button-type devices) used for blocking doors, windows, vent panels, hatches and other opening constructions. For example, once a door is opened an electric circuit of blocking loop is broken.

As wire sensors one uses a thin wire with diameter 0,1-0,25 mm, aluminum foil 10-12 mm wide and also a current-conducting composition “Pasta”. Wire and foil are glued, and “Pasta” is applied by brush onto internal side of easy damageable surfaces (glass, doors, light partitions). When damaging blocked constructions, sensors are damaged also which leads to breaking of a blocking loop.

Taut-wire sensors are made of several layers of steel wire drawn along perimeter of a guarded site between vertical columns (joint, intermediate and signal columns). In signal columns micro switches are installed that are activated from wire breakage or tension at the moment when an intruder pulls apart wire layers in attempt to penetrate into a site. This device can be also built in the form of a canopy above the fence.

Magnetically operated sensors are used for blocking of windows, vet panels, doors, hatches and consist of magnetically operated contact – “gerkon” (gerkon is a hermetically sealed glass capsule with normally open contacts press fitted inside it)  and a permanent magnet. If a magnet is placed next to gerkon its contacts will closed under the influence of magnetic field. Gerkon is usually fixed to a door or window frame, and a magnet is placed onto an opening part in such a way that it is near gerkon when a door is closed (at a distance not more than 10-15 mm). When opening a door or a window a magnet moves away from gerkon and gerkon’s contact close causing a signal.

Vibration sensors are used for blocking of glass and other easy damageable surfaces (plastic, plywood etc.).

Contact vibration sensors are devices with spring-loaded pins. When hitting a blocked surface vibrations appear and short-time opening of sensors contacts occurs resulting in electric circuit breakage and generation of alarm signal.

Contactless vibration sensors (electromagnetic sensors, piezoelectric sensors) operate on the principle of transformation of mechanical vibrations that appear when attempting to damage a blocked surface into electric oscillations. Control and indicating equipment register change of blocking loop electric circuit parameters and produce alarm signal.

Operating principle of thermal sensors is based on their ability to record inroom temperature increase above certain value. In the event of fire a sensory element (spring-loaded pins connected by low-melting solder; bimetallic strip) is distorted and opens contacts breaking electric circuit of security and fire alarms.

Capacity sensors are used for blocking of places of potential penetration to an object (window, door opening), specific items (safe box, metal case, locker), and also for perimeter guarding of objects. Their operating principle is based on registration of antenna capacity change caused by approaching of an object or a person. Antenna can be made of usual wire, metal case of safe box, other metal items.

Ultrasonic sensors are designated for blocking of premises by volume and generate alarm signal both at penetration attempt and at fire breaking-out. Their operating principle is based on registration of ultrasonic field change caused by a person entering a guarded room or by fire break-out.

Electrooptic (infrared) sensors are divided into two groups: active and passive. Active electrooptic sensors are used for blocking of premises (control of approach areas through showcases, window and door openings; blocking of approaches to guarded areas along site perimeter, ceiling areas of weakly fortified warehouse premises etc.), and also for site perimeter guarding. They help to create a barrier from invisible for the naked human eye infrared rays that initiate alarm signal when being crossed. In addition, sensors of this group detect smoke spread in premises caused by fire break-out by registering of environment transparence decrease.

Passive infrared sensors allow for detection of person’s penetration into a controlled area by registering intensity change of received infrared radiation from a moving object, and also for fire detection. These sensors are used for blocking of approaches to guarded areas in closed heated and unheated premises

Microwave sensors are divided into two groups:

  • frequencysensors;
  • amplitudesensors.

Frequency sensors detect person’s penetration into a controlled area by registration of Doppler signal. Amplitude sensors register changes of field intensity at receiver input. Microwave sensors allow for formation of ellipsoidal detection area for blocking of closed heated and unheated premises, and also for blocking of perimeter of various objects. There is a possibility of detection area size adjustment and its spatial orientation change.

Information reception, processing and retrieval equipment based on purpose and technical capabilities are divided into: single-line and multiple-line checkpoint devices, and centralized surveillance equipment. For guarding of an object at which all sensors form one electric circuit, single-line checkpoint devices are used. When there are several isolated premises at an object it is necessary to have adequate quantity of blocking loops. In this case multiple-line checkpoint devices are used.

Such devices help to control 30-50 and more loops. These devices are designed for receipt of alarm messages either from object’s single-line checkpoint devices, or directly from sensors, and also for activating a local light and sound alarm and transmission of alarm signal to a centralized security console. They are also used as centralized surveillance consoles for guarding of objects located on small territory. Thus, a checkpoint device “Bug” that allows for control up to 60 alarm loops is designated for automated guarding of banks, trading centers, hotels and other large objects.

For centralized reception, processing and retrieval of information from high number of guard objects centralized surveillance consoles and systems are used. The output information is displayed in the form of acoustic and optical signals, and in case counting and recording devices are available the output information is registered by corresponding equipment.

Centralized surveillance consoles and systems ensure control of blocking loop state at guarded sites, taking of objects under guarding and removing of objects from guarding, registration of loop breakages at guarded sites with indication of object number and nature of breach. There is a

tel.
449-4202
449-4203
tel./ fax
333-0304
 
 
 
©. Private security enterprise «ASB ». Saint-Petersburg .