ebook img

Tricks of The Burglar Alarm Trade PDF

98 Pages·1990·14.859 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Tricks of The Burglar Alarm Trade

PALADIN PRESS BOULDER, COLORADO | t 1 Tricks of the Burglar Alarm Trade by Mike Kessler Copyright © 1990 by Mike Kessler ISBN 0-87364-550-2 Printed in the United States of America First published in 1984 by Mentor Publications Published by Paladin Press, a division of Paladin Enterprises, Inc., P.O. Box 1307, Boulder, Colorado 80306, USA. (303) 443-7250 Direct inquiries and/or orders to the above address. All rights reserved. Except for use in a review, no portion of this book may be reproduced in any form without the express written permission of the publisher. Neither the author nor the publisher assumes any responsibility for the use or misuse of information contained in this book. < CONTENTS > THE BASIC BURGLAR ALARM SYSTEM.......---eeeeeeeeeeees Bau THE PROTECTIVE CIRCUIT.......... icCaria aaaa aaa et 5 SHORT CIRCUITS. 2.2.00 ce cewccccnecccccnccccccccnensece ee CONTROLS ics cee eeis cieaecatremaTR IRS ak aa 11 BELLS & SIRENS...... nsyieenielessmence wee ence nens wn wen eaneeee 17 TESTING WITH A METER........ pa eeamaa aria re 20 SENSORS.....- a sce aime Blea seen epee me a eee RE RLS RR Ee RO 23 THE PLUNGER SWITCH..... Si ae Ral Ore ale eRe alee ENRON 24 THE MAGNETIC SWITCH...... wna teen eee e ene w ewe neneneee 26 THE LEAR GWITCHec sen cee ueeueieUwre eeknReeee eeaUeeene n 29 ie: ER FA ieee serene eee 30 TRAP SES 55 SESS SSFE SU O NE SER CEU E eee ERE Cee 32 THE VIBRATION DETECTOR cos cesweecwssaewweceeenaenwewns 34 LACING ».0.0-0/8569.5e 65: b RENEE Te SES CREME UE eee eRweR 35 SHITCH HAT Sscciwawescassnrweswcenenememeaenemee ais nr 37 PROTECTING GLASS... 2c eee ence een w cece teen ence en eneneeee 38 THE PHOTOELECTRIC DETECTORs sc sivciiscwcccceeiwswaciens 48 AREA PROTECTION DEVI2. -nCce eeEe ceS enn .e cee. eree.neee es 30 THE PROXIMITY: SENSOR ccsecceec scanecewiewmnmmimaeeeeessie s 98 THE SHUNT LOCK. .... cece eee e eee e eee eee nen ene enennnee 59 TROUB6 LussE SNeS SS HNEUOES ORETWERI enNce wGeew :Se e . 62 . . _ a ee erreorenceeraneneeoeeenmens 74 _ _ _ SPECIAL TOOLS, PARTS & TECHNIQUES....ccsccccccccccceuns _ BO — — — EQUIPMENT COST REFERENCE.....-222.222202 2e5nen secesacens 89 (— FOREWORD 4 Anything worth learning is worth learning well, and learning some- thing well calls for some degree of effort. The objective of this book is to minimize that effort by avoiding the use of technical jargon, cryptic diagrams and references to electrical theory. However, this doesn’t mean the information contained in this book will jump off the pages and burrow itseif into the casual reader’s brain. The “simplified" instructions packed with most do-it-yourself burg- ar alarm kits are usually quite easy to follow, leading one blindly through the haphazard. installation of a mediocre system; explaining “how to do it,” without a word about what one is doing, or why. As a result there are thousands of so-called burglar alarms in current use, many of which can be defeated by the least sophisticated methods-—- and most of which will malfunction within a few months, often leaving the do-it-yourselfer with a collection of useless hardware fastened to the walls. Most burglars can easily recognize an improperly installed, simple to defeat, do-it-yourself kit burglar alarm just by Qlancing at its components: the often flimsy control box, drooping wires, cheap shunt locks and improperly applied window foil with sloppy connections. Many — of these packaged kits are relatively inexpensive (cheap), therefore increasingly commonplace. Most contain essentially the same type of parts-—— with instructions to install them in essentially the same way, therefore they are relatively easy to recognize and defeat by a number of simple methods. The most common of these methods is called "jumper-— ing." This is a technique used effectively by burglars to "by-pass" cheap or improperly installed alarm systems. There is a very simple countermeasu re to the jumpering technique, but it is never explained in "simplified" instruction manuals, and rarely mentioned in books. In order to apply this countermeasure one must understand the jumpering technique, which calls for thorough familiarity with the nature of closed-circuit burglar alarm systems. This book explores closed-circuit ("supervised") wiring in detail, concentrating on the basic principles that govern all closed circuit burglar alarms, ranging from those found in tenement apartments and candy stores to those used in mansions and bank vaults. Once these principles are understood, they may be applied to any type of closed- circuit burglar alarm system. The best way to learn from this book is to read it through from cover to cover, passing over any word or seg- ment that seems vague, or a bit too technical. Very often the answer to a question that arises in one section will be found in a following section, or in the next paragraph. None of the diagrams are schematic: some are self-explanatory pictorials, while others are simple line drawings. Each drawing is thoroughly supported by accompanying text. It is true that “one picture is worth a thousand words;" and it’s also true that one hands-on experiment is worth more than a thousand Pictures: The serious reader is well advised to obtain a sampling of the components described throughout this book and assemble a "bench system" (on a workbench or kitchen table), and follow each separate Ne vo alt (— section of the book with an actual experiment. This is precisely the teaching method used in all classroom and correspondence courses on security electronics—- and it works! Every student of a burglar alarm course is given a control panel, a coil of wire, one each of a variety of sensors, a power supply and some miscellaneous parts; and is guided through a number of “bench experiments." After the course is complet-— ed, the same components are used in an actual installation or they re- main part of a permanent bench system. (To be used in conjunction with the testing of new components and devices.) It is recommended to readers who intend to install a burglar alarm system to set up a “bench system" first. After becoming thoroughly familiar with each component and its particular function in the bench system, stretch out a few yards of wire, apply a foil pattern to a pane of glass (even a mirror), and practice troubleshooting with a test me- ter. To most novices, a bench system is like a set of electric trains-—- with a serious purpose. Security electronics is a fascinating world of ultimate gadgetry, a field that presently offers golden opportunities to any competent, mot- ivated individual. Burglar alarms are definitely in, and the profit potential in this business is impressive. A burglar alarm sideline can be operated out of a closet, using an ordinary car. And the initial investment is nominal. For example, one way to start up is install a system in your own home, then do the same for a friend or neighbor-- at a fair price. The price should at least recover the cost of both sets of components, enab- ling the purchase of more equipment, thus an inventory is established with practically no cash investment. Each subsequent job generates a profit while providing valuable experience. As your proficiency grows, so will your income. Thousands of profitable installation companies have started up in exactly this way; many of them are highly success- ful today-- and there‘s plenty of room for more. The techniques and equipment described in this book are not restric-— ted to residential installations, but apply to commercial premises as well. In fact, commercial premises are usually easier to wire and of-— fer exceptionally high profits to the leasing installer: Ina leasing e w arrangement, the initial (installation) charge should absorb the cost - of equipment; the system remains the property of the installer, wha — agrees to provide service and maintenance under contract (payable mon- thly.) Service contracts should not provide for free service when dam-— age or tampering is the cause of a problem. Leased burglar alarm ser- vice contracts range from 15.00 to 500.00 per month, depending on the size and sophistication of the individual system. Whether the reader intends to install only his (or her) own burglar alarm system or to strike out on a =*7new career, this book is a good Place to begin. The next step is to assemble a bench system and get some hands-on experience. Each step thereafter will be rewarding; in personal satisfaction, and cash savings-- or handsome profits. (— THE BASIC BURGLAR ALARM >) the S28 8 Seo eS eS Sees cc see ee see on arm iety A basic burglar alarm system consists of three separate segments, ided the bell circuit, the control panel, and the protective circuit. The let-— separate segments are wired together as shown in Fig. 1-1. re- ™ ererscuas" cowrRo + INSTRUMENT re arm Comme 0 erences ly yt (Lonnwn nenn ns es ! ch : zl : it ne ’ oi ' oO OQ) ui me- (oe. i | WpesNpey :: | ns-- | 'i pinned T i ' 15] [1.5 Solon be a eee .' a L 2,1 .! t BBEALTLT ERY PRCO ITRECC UT I ITV E / \ ' ~ BATTERY 7“ ROT , (3 volts) BELL CIRCUIT CONTROL CABINET Figure i-1 The bell, an 8" circular gong with a motorized hammer on its under-— side, is normally enclosed in a protective steel cabinet, which should be securely mounted to an exterior wall, high enough to be inaccessible to tampering. A pair of 14 to i4 gauge wires are attached to the bell motor’s terminals, drawn through a wiring hole in the back of the hous— ing, drawn through a hole bored through the mounting surface and into the premises, where they are routed to the control panel. The control panel is a square, steel electrical cabinet with a key- operated ON/OFF switch mounted on its face. This cabinet is securely fastened to an interior wall, somewhere in a convenient, preferably concealed location within the premises. Inside this cabinet are the control instrument, which is the "brain" of the system, and a 6 volt battery to energize the bell. The protective circuit is a pair of 22 to 20 gauge wires, which are routed through the interior of the premises. Although none are shown in this diagram, the various sensors (switches, detectors, trap cir- cuits, etc.) used to monitor anticipated points of entry, (windows, doors, etc.), will be wired into the protective circuit. The protect-— ive circuit must be routed so it passes directly across, or close to each point to be protected by a sensor. One end of the protective circuit is connected to the control panel. At the other end is an independent power supply, consisting of a pair of 1.5 volt ignition cells, wired together to form a 3 volt battery. \ _ J [ctor above, there is a separate power supply, (a 6 volt, heavy- duty lantern battery), inside the control cabinet for ringing the bell. The protective circuit power supply does not serve the bell circuit in any way! Fig. 1-2 is a closer look at the inside of a wired control panel: Fastened to the inside of the cabinet door is the control instrument, a circuit board upon which are mounted two electro-mechanical relays, shown as A & B. OL 9g 1 1 D I 2 D N I V N 6 Volt if Battery Figure 1-2 Situated between these two relays is a hole through which the rear section (body) of the ON/OFF key-switch protrudes. A pair of wires {not shown) is pulled through this hole from behind the board and connected to the key-switch. Situated below the relays and key-switch is a connecting strip with Six, Separated terminals, numbered 1 thru 6. Terminals 1 & 2 are ad- dressed to Relay A, which is the be; ll relay. Terminals 3 & 4 are alvso aisd drtehes sepdr otteo ctRievlea y cirAc. uit Terrmelianya.l s 5N ot&e & thaer e coandndercetssieodn s tot o Reltahye seB , tsemrme- bbrvpiyeeorn lalaolrtlt a s e:c osabtfnha idot vrttTetehhp reer y op,cta icbierearclcb l(tui fiinootevrf tc e .i rti1c6shc uei irtTctochob eune ilnw1tle4i6s ) cr ,tig venaoidglus it gs e d tiosrbc aaowwtincTnrtnoe eeenrsrcnm.tytei h ecnrdtaoi elusds g tho a tSt to" a&kTc neThore6e.cmrd kim oniuantTtlaoh"s le s T ehwori31 lmreii&snn & ga 2l.s 4if.no r3A &ttTs hhihexee4 tdrlatthsuohoe epensw tetia In sOmgNee abtb phigueeatirnp hrncgoiehealssfr, t ail erto a tw ihba oyafdran tulero fantad racniwtmigtsihc.leilec uedol or d nrn scen oTaanershmetrc e»pxo t fop inlwtnsteaahhthgnnyehor teawo stnutt s igohbyoh eesn w iltn eal e’ cbtmvahtoF,eeftii a tgvne.da hrp mtoyrecew-aopo i—ntrv--iieeott :ncrthh geeteeo dicr vtcaRieitolco v nautettrtah cirmttusio iisrcl nnci igg"urss fi ceaitutrna,tt i osh t etswua rip.rs”rue ow ke mmh.eeie ytsncho-etho ts w wT fihguuteponmi c vcanhyettf o eriornnol-batsn-—eo @ipctigauvhonoepseewttnp t ehelt Rrerirepc rerolaib,dultaer s p lhycot e uuetdt"iroud btlA c r.e,aen t tb iiewycstd e ,h e(itant(nthhO R g(eNee6" l ttaheakvyenero bi dymnle tlipBlsn.o p )aw ltSlehawrisrecine etlI cans3th y uhf,a.ipln o&s odpr wld4 ye)tP eW rhhrx eeaooaa nfmvntf dpioto rldatP teichrht)nheeoht,gre eth d ee p crbiait setobt ilseopcv lleoce.lr on clndoTytuncet rcotirT otramhrliccieralvutnriteiesaenedt lgd ,s paracbpaeyturot herhw3 e rett erhw&b ne oektp etu 4sy:wlpoo elrupmeeoureosndtsncnw e tseeic ttttc-hobiihi—ee-sns otfh e Rthe3 el avyok lety B -siwsb iatttcthhee.r y,p roTtheea cndtp irvoweit lelc ctiirrvceeum iati cni rrceeulniaetyr .g iziesdI t caisso nsltotanognt tallayls y ethniiensrd geip"ze“ensdud peenrbt—y ctvaihusrsooeru yg”h iotu ctum rornteihnett o rsp flrootwth ee citssi tvaetn uost ciofri cnuttiheter rucipsit recdcua.il tl.e d The" supfelorwv isoorfy " 3 cvoulrtr enetn erbgey- cuT CONNECT CUT ENDS TO NIRS . Cools, surtcu rernrnacs oO tT t CONTROL. PANEL PROTECTIVE ee CIRCUIT 1.5 Figure 1-3 pic(nirstroeocntB useuiocrttrthg) iel varerep slrm auocysti ter accratuenbi idevt neo actapb upacsltiseitro e ecdur aaiynct .cto ooa rml oaerdaFmacic,htgu .it n pg3o sa1 io- n3wa tsi rssehoot ofmo w et sop d oetlhdfeooiewnrb- tmee irntaaeol tr oegfw liiyzre eens twdriaitynths yecc hoinaspnnnergedno csttoed rce.wtv iiirtvJechedee

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.