Subscribe to RSS - alarm monitoring

alarm monitoring

Security Electronics completes backyard account purchase

 - 
Wednesday, August 13, 2014

Security Electronics, a home and business security company based in Muskego, Wis., near Milwaukee, recently purchased the accounts of Milwaukee Dynamic Security, a company headquartered on the north end of the Milwaukee metro area.

In a news release from the Davis Mergers and Acquisitions Group, which assisted Milwaukee Dynamic Security in the transaction, Don Larson, founder of Security Electronics, suggested the backyard account purchase will unite a pair of like-minded companies with similar regional roots.

The companies are also compatible on the technical level.  

“We both are in the same central monitoring facility and use much of the same equipment,” Larson noted in the release.

Jim Veith, owner of Milwaukee Dynamic, will remain with the company during the transition period, after which he plans to retire, the release noted.  

In the coming days I plan to connect with personnel at Security Electronics to discuss the implications of the deal, and how the backyard account purchase fits into the company’s near- and long-term strategies.

AvantGuard dispatcher helps foil burglar

 - 
08/13/2014

OGDEN, Utah—A dispatcher at AvantGuard helped stop a burglar from entering the home of a subscriber.

Ascent Capital reaps rewards of acquisition

 - 
08/13/2014

DALLAS—Boosted by the 2013 Security Networks acquisition, Ascent Capital, the holding company for Monitronics, a provider of home security alarm monitoring services based here, posted net revenue increases of 31.7 percent and 32.2 percent for the three and six months, re

Security Electronics acquires Milwaukee Dynamic Security

 - 
08/12/2014

MUSKEGO, Wis.—Security Electronics, a home and business security company based here, has purchased the accounts of Milwaukee Dynamic Security, according to a news release from the Davis Mergers and Acquisitions group, which assisted Milwaukee Dynamic Security in the tran

Does GIS have a future in monitoring?

The industry’s mobile trajectory could make Geographic Information Systems into a broader trend, industry watcher says
 - 
08/06/2014

LONGMONT, Colo.—On the central station side, effective and timely use of information can make the difference between a better or worse outcome. It’s within this discussion that a tool like Geographic Information Systems, or GIS, can look like a difference maker, both for central stations and subscribers, Tim Auen, director of mobility products at Intrado, a provider of emergency communications infrastructure, told Security Systems News.

Are wireless home systems vulnerable?

 - 
Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, sketched a funny, dystopian picture of the connected home in revolt, commandeered by morally wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad cyberpunk films from the 90s, these lonesome code junkies are intent on doing everything from dousing homes by activating sprinkler systems to invading your privacy in all the imaginable ways in a home well stocked with network cameras.

The piece, titled “The Nightmare on Connected Home Street,” is meant to be absurd: The narrator is jarred awake at four a.m. by the blaring pulse of dub step music exploding from his connected pillow. The vignette ends, a few hours later, with a bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, of course, but the piece is entertaining and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on concerns that, surprisingly, have nothing to do with Internet connected devices. This time, the article dealt with security vulnerabilities related to wireless home alarms, which, according to a pair of researchers cited in the article, could be compromised—the alarms either being suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems with a number of brands.

The issue, according to the report, has to do with radio frequency signals. While the conversation is understandable enough for a layman, it can drift into the arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels," the report said, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

A vulnerability is a vulnerability, and certainly no security company wants there to be any possibility of a system being hacked. But it probably should be mentioned that while these techniques may come across as elementary to the reading community of Wired Magazine, these methods would probably be, for your run-of-the-mill thief, well above average from a sophistication standpoint.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference held in Las Vegas next week. I’m eager to here more about their findings and to see what kind of impact the research could have.

Security threats to wireless alarms?

 - 
Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, painted a funny dystopian sketch of the connected home in revolt, commandeered by morally wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad cyberpunk films from the 90s, these lonesome code junkies are intent on doing everything from dousing homes by activating sprinkler systems to invading your privacy in all the imaginable ways in a home amply stocked with network cameras.

The piece, titled “The Nightmare on Connected Home Street,” is of course meant to be hysterical: The narrator is jarred awake at four a.m. by the blaring pulse of dub step music exploding from his connected pillow. The vignette ends, a few hours later, with a bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, but the piece is entertaining and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on concerns that, surprisingly, have nothing to do with Internet connected devices. This time, the article dealt with security vulnerabilities related to wireless home alarms, which, according to a pair of researchers cited in the article, could be comprised—the alarm being either suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems with a number of brands.

The issue, according to the report, has to do with radio frequency signals. While the conversation is understandable for a layman, it can seem a bit arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels,” according to the report, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference held in Las Vegas next week. I’m eager to here more about their findings and to see what kind of impact the research could have.  

Security threats to wireless alarms?

 - 
Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, painted a funny dystopian sketch of the connected home in revolt, commandeered by morally wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad cyberpunk films from the 90s, these lonesome code junkies are intent on doing everything from dousing homes by activating sprinkler systems to invading your privacy in all the imaginable ways in a home amply stocked with network cameras.

The piece, titled “The Nightmare on Connected Home Street,” is of course meant to be hysterical: The narrator is jarred awake at four a.m. by the blaring pulse of dub step music exploding from his connected pillow. The vignette ends, a few hours later, with a bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, but the piece is entertaining and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on concerns that, surprisingly, have nothing to do with Internet connected devices. This time, the article dealt with security vulnerabilities related to wireless home alarms, which, according to a pair of researchers cited in the article, could be comprised—the alarm being either suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems with a number of brands.

The issue, according to the report, has to do with radio frequency signals. While the conversation is understandable for a layman, it can seem a bit arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels,” according to the report, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference held in Las Vegas next week. I’m eager to here more about their findings and to see what kind of impact the research could have.  

Security threats to wireless alarms?

 - 
Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, sketched a funny, dystopian picture of the connected home in revolt, commandeered by morally wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad 90s cyberpunk films, these lonesome code junkies are intent on doing everything from dousing homes by activating sprinkler systems to invading your privacy in all the imaginable ways in a home well stocked with cameras.

The piece, titled “The Nightmare on Connected Home Street,” is of course meant to be hysterical: The narrator is jarred awake at four a.m. by the pulse of dub step music exploding out of his connected pillow. The vignette ends, a few hours later, with a bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, but the piece is entertaining and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on concerns that, surprisingly, have nothing to do with Internet connected devices. This time, the article dealt with security vulnerabilities related to wireless home alarms, which, according to a pair of researchers cited in the article, could be comprised—the alarm being either suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems with a number of brands.

The issue, according to the report, has to do with radio frequency signals. While the conversation is understandable for a layman, it can seem a bit arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels,” according to the report, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference held in Las Vegas next week. I’m eager to here more about their findings and to see what kind of impact the research could have.  

Talking keypads and panels with Karen Sullivan

 - 
07/30/2014

MEMPHIS, Tenn.—Security Systems News recently caught up with Karen Sullivan, recently named sales manager at Z-Tech Central, to discuss how she handles security at home.

Pages