Personal attack alarms are a familiar part of hard wired intruder alarm systems but how far will installers become involved with extensions of this technology, asks Gerard Honey

As the security systems sector has developed over the years we have seen a greater use of mobile communications, an increased integration with other networks managed from remote locations and now, Internet Protocol (IP) working.

It all suggests a future of global proportions, since links to our traditional systems within the international landline and cellular telephone systems are now commonplace. Indeed, in the long term, we can even expect to see links with the Global Positioning System (GPS).

This is a satellite based navigation system originally developed by the US Defence Department using a constellation of satellites to pinpoint a user’s exact location anywhere in the world and then displaying the information in an appropriate format.

It is currently used by the emergency services in route planning and for the tagging of offenders. Unfortunately, the future is also suggesting a higher incidence of robbery or muggings at street level. In addition, we continue to see more kidnap-ping and the seizure of vulnerable people. It remains to say that although we have the technologies available to monitor a user being threatened, it is rather more difficult to put into effect the infra-structure to combat the threat and to respond to the scene within an acceptable time period.

In the first instance we need to see how we can generate a very simple call for help using a time honoured security system.

The international PA device

The familiar personal attack alarm (PA) used with hard wired intruder alarm systems is classified as a deliberately operated device and has traditionally been governed by BS 4737: Part 3: Section 3.1. Operation is by pressing a button/s on the unit if the user is threatened or needs attention. It must be wired to generate an alarm output at all times and be sited at a fixed location to suit the premises.

In the domestic sector, we tend to find them adjacent to the front door and at the bed head in the main bedroom.

They are also used to great effect close to counters and tills in banks, shops and retail outlets in a push button or kick bar format. For those situations which demand an increased sense of security in regard to circumstances of immediate danger, the PA has always offered distinct benefits.

Certainly the personal attack device has, for a long time, had an international role and acceptance. However, progression in communications and remote signalling means that an even greater role can now be played by the PA in domestic mainstream applications. It can easily be connected to the A and B lines of the telephone network by adding a new generation speech dialler for low risk security communications.

This allows a specific PA display to be identified at the control equipment and an instant voice message to be forwarded to a remote location.

A support SMS text can also be sent with tamper and abort included.

Therefore, recipients of the transmission are notified over the landline and/or cellular networks and the alarm signal is actually a PA activation.

The upgrade of PAs and the addition of new generation speech diallers all lead to newbusiness and heightened customer satisfaction.

When the European Standards are fully implemented the speech dialler system will be classed as Grade 1 to BSEN 50131-1 with the preventative maintenance therefore remaining at one visit per year.

Using a speech dialler provides a particular benefit. Although the local ‘bells only’ signalling of a personal attack device brings attention to a protected premises, it cannot immediately identify the transmission as PA rather than intruder or fire, for instance, in the same way as the dialler can.

The only consideration is that the control equipment must support a unique PA output to the speech dialler or a purpose programmable output, although this is now a feature of most current production panels.

It would not be adequate to only use the sounder/strobe outputs as it is clear that although the panel would identify a personal alarm, the dialler could not. Equally, it is not normal to use a PA device with two switching elements, in that one opens the personal alarm zone and the other element signals the dialler.

The interconnection circuits should be such that the equipment continues to comply with the requirements of EN 41003 4.2 for telephone network voltages and EN 60950 2.3 for safety of the extra low voltage circuits after making the connections. Also, only approved power supplies are to be used because of the connection to the telephone network.

A useful option is to interface an adjustable timer module in an additional PA circuit. It is activated by pressing a unique momentary PA unit immediately before the user leaves the premises to undertake an activity or answer a door. The PA must then be pressed again within a period of time to reset the timer and confirm that the activity has been carried out satisfactorily and that the user has returned or the circuit goes into alarm. The timer need only include a relay output to switch the circuit.

The portable PA device

Taking the philosophy a stage further, a hand held or pendant radio PA unit is an ideal addition to any new or existing system, alongside the installation of a speech dialler, as they are fully portable. They can be operated by the user well beyond the confines of the protected premises and in range of the receiver up to a distance of some 500 metres, so there is much greater scope for using the PA than that offered by the static device.

The upgrade of PAs and the addition of new generation speech diallers all lead to new or ext-ended business prospects and heightened custo-mer satisfaction in the volume domestic sector.

They are also of particular value in lone worker schemes or when the user must move beyond different buildings that are in reasonably close proximity.

All personal alarm devices have always been, and for the future must remain, inherently reliable. The wireless PA is no exception and will have a battery status indicator. Equally, it needs to have the operating button held down for a period in the order of one second to avoid false activa-tion, as momentary operation must not generate an alarm.

The wireless receiver can be program-med as non latching or latching in that the 12 volts supply must be interrupted to reset the relay, otherwise it holds its activated status at the control panel. The receiver may also have additional relay outputs to signal further devices direct.

Future mainstream mobile phones may include a PA or duress button

If a specific wire free system was to be used it should, as a minimum, be Class 3.

A global future

The future suggests a greater use of mobile communications and global security through tracking techniques using the cellular and GPS systems with real-time video. This would result in the activities of a user being plotted so that their routes are monitored and logged well in advance of any PA activation or the personal contact links being disrupted.

Such intelligent systems could then anticipate problems if the user started to follow an irregular or unclassified movement pattern.

In the long term, even mainstream mobile phones may themselves include some unique form of PA or duress type of button alongside a facility to send increasing video images.

The immediate future is rather more clear.

We are continuing to witness more control equip-ment featuring integrated PA and duress outputs. Such equipment is also being supplemented with designated links for speech diallers and commer-cial communication equipment.

In advance of this we need to employ more verification techniques and include silent signalling rather then relying on traditional ‘bells only’ technologies working by themselves. We also need to see how we can extend and improve our personal alarm systems by readily available existing technologies.

The significant advances in technology within our industry throughout the last few years have all been governed by communications and the sharing of data.

In all instances we need the infrastructures to respond to electronic calls for assistance. We also need to think about what will probably be available in our industry so as to plan for future security installing.

There will always be the different levels of security risk to consider and the budgetary constraints. However, for now it may be more the case of simply controlling the threats to personal security, offering greater peace of mind and installing components that reduce the perception of crime.