Duress Codes For Alarms Systems

By: Ari Erenthal, Published on May 02, 2017

An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to disarm the alarm, however, that adversary can gain entry without alerting emergency responders. Therefore, alarms in high risk locations are sometimes programmed with a duress code, which is a code that disarms the alarm while sending a panic signal to the central station monitoring company. In this guide, we examine duress codes, including 

  • Robbery vs burglary
  • Robbery types
  • How to use a duress code
  • Duress code training
  • Duress codes affect alarm user behavior
  • Panic Signal Response
  • Best practices 

** ***** ****** *** call *** **** ** the ***** ** ** ********* break **, *** **** if ** ** *****. If ** ********* ****** an ********** **** ** disarm *** *****, *******, that ********* *** **** entry ******* ******** ********* responders. *********, ****** ** high **** ********* *** sometimes ********** **** ******* ****,***** ** * **** that ******* *** ***** while ******* * ***** signal ** *** ******* station ********** *******. ** this *****, ** ******* duress *****, ********* 

  • ******* ** ********
  • ******* *****
  • *** ** *** * duress ****
  • ****** **** ********
  • ****** ***** ****** ***** user ********
  • ***** ****** ********
  • **** ********* 

[***************]

Robbery ****** ********

********** * ***** **** involves *** *** ** force ** ****** ** force ******* * ****** present. **** ** ********* from********, ***** ** *** unauthorized ******** ** * structure **** *** ****** to ****** * ***** when ** *** **** is *******. **** ****** are ******** ** ******* or ****** **********, *** to ***** *** ******** owner ** * ****** safety ****** ** *** event ** * ********.

***** ******* *** ****** codes *** * *** of ********** ******* ****** as * ***** ** calling *** **** ****** robberies.

Robbery *****

*** *** ***** ** robberies *** ****-*** *** take-overs. 

** * ******* ****-** *******, * ****** ********* ******* approaches * ****** ********, making ** ****** ** be ********. **** ********* may********(************* *******) * ******, or ****** ***** **** they ******* ***. *** goal ** * ****-** is ** *** **** as ******* *** ** quietly ** ********. *****, an ********* **** ****** hand * **** ** an ******** **** * list ** ***** *******. This **** ** ********* is ****** *****-******. ****-******* ********* *** the **** ****** **** of **** ******* *****. 

** * ***********-**** *******, *** ********* ** adversaries **** ** **** noise ** ******** ** order ** ********** *** rob * ***** ****** of ****** ** ****. The *********** ******** ***** weapons *** ***** ** at ******. ****-**** ********* by ***** ****** *** extremely ******** *** *********, and ***** ** ***** little ****** ** ******** a ***** ****** ****** the ******** ** ******** with ***** **** ** **** rail. *******, ** ** adversary ****** ** ******** to ***** * **** in ***** ** **** entry ** * ********* or * *****, *** employee *** **** *** opportunity ** ***** * duress ****. ****-**** ********* are *****. 

How ** *** * ****** ****

** ********* **** **** ***** or ****** ** ***** to **** ***** ** a ********* ******** ****** be ***** ********* *********. Having * ******** ****** code ********** ***** *** adversary *** ********** ** complying **** ***** ****** while ************** ******* *** help. *** ***** **** function ******** ***** * user ****** * ****** code, **** ** *** to **** **** * duress **** *** **** entered ***** ********* ********** arrive. 

******* **** *** ********* with ** *********'* ****** is *** **** ******** ** hold-ups *** ****-**** *********. If ** ********* ****** wants ** ***** *********, and ** *********** *** safety ** ** ********, vendor, ** ******** ** order ** ** **** to ** **, *** safest ****** ** ****** is ** ***** **** to ***** **** **** like *** *****. ** the ********* ******** ** employee ***** * ***** button ** **** ** the ***** ** **** for ****, **** *** become ***** ** **********, which ***** **** ** tragic *******. ******* **** company's ********** ** ********** policy ** ********** *** this.

Duress **** ********

*** ******** *** ** expected ** *** * panic ****** **** ** trained ** ** **, and ****** **** ******** on * ******* *****. Victims ** ********* ***** become ******* *** ****** their ************. **** ******* training *** ****** **** employees **** **** ** do *** **** *** to ** ****** * robbery. 

**** ** ********** **** with ****** *****. ** an ******** ** **** to ********* *** ***** ***** the ****** **** ****, they *** ************* ** so **** ****** ** enter ***** **** ** an *********. *********, *** employee **** ** ******* to *** *** ****** code, *** **** ******** doing ** ** * regular *****. *** ******* *** regularity ** **** ******** depends ** *** ******* the ******** ** ****** to ****. *** ***** installer ****** ******* **** training **** *** ****** responsible *** ******** ** the ********, *** **** person ****** ** ******** to ********* ******** ******* procedures **** *** ********.  

Duress ***** ****** ***** **** ********

****** * ****** **** can **** ****** *** danger **** ********* ** high-risk ********** *** ************* face. Businesses **** ******* ***** robbers **** ** *****, pawn *****, ******* ******, and ***** ******* ****** need ** **** ******** ways *** ********* ** call *** **** ******* drawing attention ** **********. ********* with ** ********* ** often *** ****** ****** of ******, *** ********* who **** **** ********* services **** **** ****** are **** ****** ** simply ********* **** *** robber. This ********** *** ********* to ***** ** ******* and ******* ** ******** which, ** ****, ******* the ****** ** *********, vendors, *** *********, ***** limits *** ********* ** the ******** *****. 

Panic ****** ********

****** **** ** **** alarm ***** ******* **** seriously, ********* * **** priority ** ***** ***** of *****. **** ** especially **** ** *** customer *** ***** ************, allowing *** ******* ******* monitoring ****** ** ******** the ********* ** *** police. ******** * ****** code ** *** ********* of * ******* ********* gives police * ****** ****** of ********** ** * robbery ** **** ** take ******* ** *** situation.

Best *********

** ** ********* ******* aware **** * ***** signal *** **** ****, they *** ****** ***** or **** *******. *********, ***** effort **** ** **** to ** ********. ** ********* willing ** ***** * user ** ****** ** alarm **** ****** **** to ******* ******* *** code ***** *******. ****** codes **** ** ****** and ********** ** *** to **** ** *** siren.******* ****** ***** ****** never ** ****, ** case ** ********* ********** it (*.*.*-*-*-*,*** **** ****** **** run ******** **** *** middle ** *** ******). Users ****** ** ******* to ***** *** ****** code ****** *** ******* arguing ** ********* *** adversary. **** **** ********** should **** ***** ***** on * ******* *****, contacting ******* ******* ** confirm **** *** ****** signal *** ********, *** alarm ********** ****** **** the ****** ** ****** of ******** *** ** do **. **** ***********, all ********* *** *** need ** *** * duress **** ****** ** shown *** ** *****, so **** **** **** the ********** ** *** resultant ****** ******** ** they **** **** ** use *** ****** ****. 

Comments (6)

One of the ways we use duress codes is with access control. Almost all of our access control systems are integrated with intrusion via the DMP control panel and are pin plus card. We program in multiple user codes for each person including a duress code. So if someone walks up to a door and is being forced to open it, they scan their card like normal and enter their duress pin rather than their normal pin. This will, of course, disarm the system and unlock the door like normal. This combination of card plus duress pin alerts the central station. 

I don't know how but I missed that article when it was originally published. In some systems we have installed blue strobe lights in back rooms where employees are (not in front lobbies) to give a visual warning for when there's a holdup/duress situation in progress. This way they can decide if they need to trigger lockdown protocol and have everyone move to a secure area. Whenever we've done this the clients have had bullet proof glass, bullet proof sheetrock and reinforced doors. This protocol wasn't something we came up with but was implemented by the clients. 

That's a fine idea, actually. 

I remember years ago a residential customer got mad at me because she thought I kept saying a "Dress Code" was required.. True story..

I remember a case when the victim was beaten to death until the guards came in because he used silent alarm only.

Is there any statistics which would show how many robberies went south due to loud/silent alarm ???

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Hikvision Global News Reports Directory on Dec 02, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
China Uyghur Analytic Projects Require Intel And NVIDIA, Intel Condemns, NVIDIA Silent on Dec 02, 2019
At least 8 PRC China police projects require NVIDIA and Intel chips to power their Uyghur-detecting analytics, according to procurement documents...
Vunetrix Health Monitoring Company Profile on Nov 26, 2019
Vunetrix boasts that they make the integrators the 'HERO' by using Vunetrix's monitoring. We spoke to Vunetrix to better understand their...
Wyze AI Analytics Tested - Beats Axis and Hikvision, Now Improved, Now Being Terminated on Nov 25, 2019
When we originally tested Wyze's free person detection deep learning analytics in July 2019, they performed well, with few false alarms, but a long...
China Government Spreads Uyghur Analytics Across China on Nov 25, 2019
IPVM has found 12 recent government projects across China (PRC) that require Uyghur analytics and a general government guideline requiring such...
Camera Field of View (FoV) Guide on Nov 13, 2019
Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem...
100+ Companies Profile Directory on Nov 06, 2019
While IPVM covers the largest companies in the industry regularly (like Axis, Dahua, Hikvision, etc.), IPVM strives to do a profile post on each...
Tailgating: Access Control Tutorial on Oct 31, 2019
Nearly all access control systems are vulnerable to an easy exploit called 'tailgating'. Indeed, a friendly gesture in holding doors for others...
Dahua Co-Founder Says Human Rights Sanctions Shows Strong Dahua Technology on Oct 29, 2019
Despite Dahua doing nearly a billion dollars of projects in Xinjiang, including building and operating police stations, Dahua not only denies 'any...
Lock Status Monitoring Tutorial on Oct 28, 2019
Just because access doors are closed does not mean they are locked. Unless access systems are using lock status monitoring, the doors and areas...

Most Recent Industry Reports

IP Camera Installability Shootout 2019 - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Uniview, Vivotek on Dec 09, 2019
What are the best and worst cameras to install? Which manufacturers make it the hardest or easiest to install their cameras? We tested 35 total...
Viisights Raises $10 Million, Behavior Analytics Company Profile on Dec 09, 2019
Viisights, an Israeli AI analytics startup marketing "Behavioral Understanding Systems", announced $10 million Series A funding. We spoke to...
Disruptor Wyze Releases Undisruptive Smartlock on Dec 06, 2019
While Wyze has disrupted the consumer IP camera market with ~$20 cameras, its entrance into smart locks is entirely undisruptive. We have...
Bosch Budget 3000i Cameras Tested on Dec 05, 2019
Bosch has long had a hole in its lineup for, as it describes, "competitively-priced cameras". Now, Bosch has released its 3000i series cameras...
Anixter Resisting Takeover From Competitor on Dec 05, 2019
Mega distributor Anixter is going to be acquired but by whom? Initially, Anixter planned to go private, being bought by a private equity firm....
Security Sales Course 2020 - Last Chance Save $50 on Dec 05, 2019
This sales course is customized for the current needs and challenges specific to professionals selling video surveillance and access control...
Ireland National Children's Hospital Chooses Hikvision End-to-End With Facial Recognition on Dec 05, 2019
The world's most expensive hospital project ever, the New Children's Hospital in Ireland, has chosen an all-Hikvision surveillance system including...
AVTech ~$70 IP Cameras Tested Vs Dahua and Hikvision on Dec 04, 2019
Taiwanese manufacturer Avtech is taking direct aim at low cost leaders Dahua and Hikvision with ~$70 starlight and white light illuminator...
Ultinous European Analytics Startup Company Profile on Dec 04, 2019
European analytics-startup Ultinous pitches customers to "Have your own video analysis service!" We spoke to Ultinous to better understand their...
Access Startup Multi-Mount Aims To Streamline Reader Installs on Dec 03, 2019
Startup Multi-Mount claims it makes installing access readers 'Fast', 'Secure,' and fit 'any size frame.' The company states its bracket 'fits most...