Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Hearst Castle’s Safety Moat

September 1, 2005
Many of the nation’s historic landmarks are home to noteworthy art and architecture. Such national treasures need protection from smoke and fire, but conventional smoke detectors can intrude on the ambience of a special place.

Providing adequate protection for such a place can present certain challenges posed by architectural design, height and volume configurations, airflow, obstructions, evacuation plans, etc. These factors can affect smoke dilution and smoke stratification, which in turn can reduce the response rates of some smoke detectors. High ceilings can make the maintenance of conventional detectors difficult.

More importantly, conventional smoke detectors generally do not detect a fire until after the incipient stage, when heavy smoke and flaming has occurred. The landmark’s structure and precious contents are then damaged not only by smoke and flame, but also by the water or chemicals used to extinguish the fire.

William Randolph Hearst furnished his California “castle” with art and antiques from around the world, including intricately carved walls, ceilings and columns. A high technology, highly sensitive smoke detection system protects Hearst Castle.

Hearst Castle

Located 250 miles north of Los Angeles, Hearst Castle, a historic house museum, is home to a priceless art collection. The estate overlooks the Pacific Ocean and 80,000 acres of grasslands. It is considered a jewel of the California coastline.

Over a 28-year period, from 1919 to 1947, newspaper magnate William Randolph Hearst and San Francisco architect Julia Morgan created this palace to look like those Hearst had seen as a boy in Europe. The estate, where Hearst entertained Hollywood stars, business moguls and the era’s leading political and athletic luminaries, has 165 rooms and 127 acres of gardens, terraces, pools and walkways. It totals 90,080 square feet.

A distraction at best, a conventional smoke detector at the center of a rosette (upper left) on this ornate ceiling at Hearst Castle is shown here as a contrast with the barely visible sampling point at the center of the other rosette below it (lower right).

Leading edge

The challenge was to integrate leading edge smoke detection systems with the fabrics of historic structures to get maximum detection sensitivity with minimal structural and visual impact. The estate has a gravity-fed hydrant system and some wet-pipe sprinklers; but since most tour areas were not equipped with sprinklers, it was necessary to rely on early warning. There were also concerns about preserving ceilings – which were themselves works of art – where the installation of traditional smoke detectors would damage what they were intended to protect.

VESDA air-sampling smoke detection equipment from Vision Systems Inc. of Norwell, Mass., was chosen to meet these requirements. Designed to detect fire at the earliest pre-combustion stage virtually before smoke is visible to human eyes, a VESDA system works by continually drawing air from multiple sampling points into a pipe network and actively transporting it to a detector. The detection unit contains a dual-stage filter that removes dust and dirt and provides a barrier of clean air that keeps the optical surfaces uncontaminated for stable calibration and detector longevity. When the air sample passes through the detection chamber, it is exposed to a laser light source. If combustion particles are present, light is scattered within the chamber and sophisticated circuitry sends a data-rich alarm signal to a fire alarm control panel, software management system, or building management system. One detector can monitor the entire progression of fire growth.

At the center of this ceiling design is a small hole – a sampling point for a smoke detection system. It leads to a pipe network above the ceiling, through which air is pulled to a laser-equipped detection chamber.

Sensitive sensors

The VESDA LaserPlus’ sensitivity range is 0.0015 to 6 percent obscuration per foot. The LaserScanner locates the origin of smoke by identifying the pipe with the highest level of smoke. It then continues to sample from all sectors to monitor fire growth. It provides four alarm levels for each individual pipe, and offers individual pipe addressability and individual pipe settings.

Programmable alarm thresholds provided the widest window of opportunity to detect, investigate and control the spread of fire. The detectors were installed in an accessible area where maintenance would not require ladders.

The LaserScanner display module uses a bar graph to show the rising level of combustion particles and the sector or sectors where they originated. Compatible with standard fire alarm panels, the system can activate a piezoelectric buzzer and a flashing light.

The approach “gives us significantly faster and more reliable detection than conventional systems, as well as improved sensitivity in some of the larger areas where stratification can occur,” said Lawrence Ross, stationary engineer for Hearst Castle. “We have documented events where it detected electrical faults and excessive carbon ignition that our conventional system never picked up. Aesthetically, we have had great success in our guest house installations, by being able to use quarter-inch capillary tubing for sampling points that challenge even the sharpest eye to spot.”

Training & tools

Improving fire protection at Hearst Castle is a continuing process. The latest installation was a scanner for a recently restored maid’s quarters. The company plans to add mid-level air sampling in some of the taller rooms, to mitigate several of the more stubborn stratification problems.

Wireless communication systems, which play a security role, can also be used for portable systems in museum galleries.

Sidebar: Multi-duty Tech in Museums

Network cameras with a built-in server can secure a museum or a special display at the facility but also allow people to view real-life activities from anywhere. Chelmsford, Mass.-based Axis Communications added to this solution with its AXIS 207 Network Camera using MPEG-4 image compression. Designed for indoor surveillance and remote monitoring applications, it operates independently of a PC and contains a built-in Web server. More information at www.axis.com.

New-age communication systems are a security essential but can also provide other duties for museums. A case in point: Sandy, Utah-based Listen Technologies’ portable FM system which is being used at the Museum of Contemporary Art Cleveland (MOCA) as a unique sound solution for artist- and docent-led gallery tours. John Grayson, the museum’s director of development, explained the museum’s existing sound system couldn’t deliver in their 23,000 square foot gallery and to a steady stream of traffic. More information at www.listentech.com.

For More Information

Material for this article was written

by Caterina Tabor of Vision Systems

Inc. Contact her at (781) 740-2223;

e-mail cathy.tabor@visionusa.com; or at www.visionusa.com. More information on life safety is also at www.securitymagazine.com – use the LINX service, powered by Google.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Recording New Revenue with Surveillance Cameras at The Castle

    See More
  • remote-work-freepik35678.jpg

    Rethinking the current cybersecurity landscape

    See More
  • Bus_Allston_Dedicated_Lane_2019-4964

    MBTA Safety Review Panel Makes Recommendations to Improve Safety

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing