About
Community
Bad Ideas
Guns & Weapons
Irresponsible Activities
KA-FUCKING-BOOM!
Locks and Security
Scams and Rip-offs
Drugs
Ego
Erotica
Fringe
Society
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Burglar alarms - Part 1


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
PARAGON CONSULTANTS Inc. PRESENTS.............

TECHINIQUES OF BURGLAR ALARM BYPASSING
File Compiled by: THE RAVEN!!
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

THIS IS PART 1 OF BURGULAR ALARM BYPASSING.

DISCLAIMER: This file is written for informational purposes only.
The sysop of the bbs you got this file from does not advocate the
breaking of any laws and will not be held accountable for misuse of
the information contained in this file it is intended for uhhmm
informational purposes only! yea thats it!

This file may be reproduced or put into any newletter or fourm, the
only thing asked is that proper credit is given, it took a while to
write these files and others.
THE RAVEN
+=======+

Now on with the shit.......

Part 1 is an introduction to the various types of alarms in use today.
So we will discuss the circuits that guard a building's perimeter.
Therefore, they are used primarily on doors and windows. The most
common member of this family is the magnetic switch, the little set of
white rectangular boxes seen above doors of most businesses. RadioShack
is one business that love to use them because they market them for there
home security line. Part 2 will deal with second line defense, the area
sensor. These sensors monitor a specific area rather than a specific
point of entry. These are often called motion detectors, sinnce anyone
moving about a guarded room will be detected.(like no shit!) The way in
which these sensors achieve this goal varies between components. And in
Part 3 I will give you some general notes and observations on alarm
bypassing.

1.0 MAGNETIC CONTACT SWITCHES

The magnetic switch is the most common of all hardwired components found
on doors and windows around the world. It consits of two individual pieces,
the switch itself, and the companion magnet (see Fig 1-1). The switching
mechanism is a spring loaded lever that makes contact with a stationary
metal arm when the companion magnet is near. So the magnetic switch is a
normally closed circuit. When the magnet is pulled away (see Fig 1-2), the
lever is released from the stationary arm and the circuit is no longer
complete. So, the opening of aprotected door or window removes the magnet
from the switch, and since the circuit is no longer complete the alarm
sounds (simple electronics!!). Since the circuit of a magnetic contact
switch in normally closed wires cannot be cut to defeat the system cause
this has the same effect as removing the companion magnet.
The magnetic switch offers more opertunity for jumpering than does any
other individual component. since the wires are often visible, one only
needs to remove the insulation, and place a small wire across the circuit
to defeat and bypass the switching mechanism (fig. 1-3). The main problem
for the thief then is to locate the wires if they are not visible. Often
they are hidden behind baseboards or trimming or are snaked through the
studs behind the drywall. They may be uncovered from the outside after
the bricks and wallboard have been removed.

Figure 1-1 Figure 1-2
Closed Switch Open Switch
I II I I II I
I II I I II I
I(------)II(-------)I I(--------)II(-------)I
> I(...../)II( + )I I(:....../)II( M )I
=======@@: / )II( )I =======@@: / )II( I M )I
I( / )II( ### )I I( / )II( S A )I
I( /--:)II( ### )I I( / )II( S G )I
< I( :)II( ### <---MAGNET I( -:)II( I N )I
========@@: :)II( ### )I =======@@: ^ :)II( N E )I
I( :::::)II( ### )I I( ...|..:)II( G T )I
I(------)II( ### )I i( ---|---)II(--------)I
I II( )I |
I II( + )I Connection broken
Because of missing magnet
so the alarm sounds!!!!!!

Figure 1-3

I II I
I II I
=============*==@ II I
* I II I
* I II I
=============*==@ II I
I II I
^
|_ Jumper Wire

Usually one has to already be inside to get at the wires however ther are
a few tricks that burglars employ. Often a hole can be drilled into the
window and jumpering is done if the wires are visible. One way to make the
wires visible is to unscrew the switch and give it a little pull. The wires
will probably be stapled and may be difficult to pull, but there is a
chance that the wires are just stuffed in between the studs. This is done
carfully so the switch is not removed too far from the magnet. Also if
possible the magnet may be unscrewed from the window itself and taped to
the switch (It was done to a Radio Shack!). The door or window could then
be freely opened.

1.1 Window Foiling

Window foiling is probly the alarm which everyone is familiar with. It
graces the windows of nearly every store in America, and rightfully so, it
is very difficuly to bypass successfully BUT NOT IMPOSSIBLE!
When a window is to be monitored by foil the foil is stretched around the
perimeter of the window. Two terminals are placed at the end of the foiling
and are connected to the rest of the circuit. The foil is now part of a
normalclosed circuit, its so fine that if a break occurs in the glass, the
foil will tear, opening the circuit and causing the alarm to ring.
Foiling is often coupled with magnetic switches and there lies the big
problem for the burglar. If he cannot break the window how can he/she
enter? There are three primary methods that burglars employ when defeating
window foil. Amateurs on the other hand who dont fully understand the
principles of window foil cicuit try some crude methods that are usually
unsuccessful. They sometimes smash a window and hope that the foil won't
break as well. The odds of this happening are astronomical, they better
try playing lotto! Amateurs even try cutting the entire window out since it
allows them to get access to the jumper terminals. But any slight movement
in the wrong direction sets off the alarm (while they're holding a 20
pound sheet of glass).
One method that will work provided the window is large enough (or the
burglar is small enough) is the cutting of a crawl space in the window that
is far enough from the foil so it can be undisturbed. The entire window
is covered with a strong duct tape, leaving blank the hole intended to be
cut. The hole preferbaly square, is scribed with a high quality diamond
tipped glass cutter. The cutter is then used to trace and retrace the
scribbed line until the glass get quite thin. When the lines have been
determined to be deep enough, a thin layer of modelling clay is applied
to the glass area that is to be removed. Then a thick wet newspaper
(to shield the noise) is laid over the potential hole and tapped sharply
around the scribbed lines. With practice the glass will break only where the
lines were cut. The duct tape serves as a shock-absorber, and also keeps
the plass from shattering and falling to the floor if a mistake is made.
The layer of clay serves to deaden the sound of the glass as it hits the
floor inside.
Another method often often used is the jumpering of the two foil terminals
If they are visible a small hole is drilled into the glass near them
(when drillin glass always use a carbide bit). A wire is then laid across
the terminals to completely bypass the whole foiling system. The wire is
then fasten securly to the terminals to avoid having it fall off during the
mission. At anyrate if jumpering is successfully accomplished, the entire
pane of glass can be shattered without setting off an alarm.
The third method is utilized when one has prior access to the premises.
When no one is looking use a razor blade to slice a line thruogh the foil.
The slice is clean enough to so it can't been seen easily but also deep
enough to the the circuit is not intact. When the store owner decides to
arm the alarm (turn-on) he'll discover that the zone zone covering the
window is not properly armed. After a quick survey of all the window foil
he figures that the system must have malfunction and decides to call the
repairman first thing in the morning. If this occurs the window containing
the cut foil will remain unguarded all night. It is possible that the owner
could call a repairman that instant, but AN INTELLIGENT burglar will be
keeping his/her eyes out for that. If the owner finds the tear there really
nothing much he can do without the proper tool and supplies. From the
burglar's vantage point he/she could be able to see any repairs the owner
is making on a particular window and act accordingly.
NO, window foiling is not particulary easy to bypass, but remember it is
not necessary that the burglar enter through a window either. They know
that a window that has just been cut is not a pleasant thing to crawl
through, and it's not terribly wise place to be seen crawling. A large
hole cut in a windoew just has "BURGLARY" written all over it for any
passer-by.
Well I've given you the basic and there is more to encounter so look
for part 2, so until the don't get caught and do it right!

THE RAVEN
+=======+
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-==--=-=-==-=-=-=-=-=-=
Also look for my other text files on: Van Eck HAcking,Burglar Alarm Bypass
part 2 & 3, Beyond Van Eck Phreaking and THE CIA SERIES FILES!
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
3 fight 1 guy
Robbing a dealer out of state (hypothetical)
Want Revenge on Some Guy's Car
Found CHeck
Breaking into garages?
House Arrest
Pedobaiting
Free Logitech Products Wihtout Owning
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS