Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Reducing False Alarms with Audio as a Secondary Verification Source

By Richard Brent
Security blog default
February 5, 2019

In 2015, I read the Partnership for Priority Verified Alarm Response (PPVAR) best practices on audio verified alarms. While I found it a bit complicated to fully understand, I knew that the Partnership was on to something. In our lives, the two senses of the human condition we count on is sight and sound. A wonderful pairing, it is crucial to both see a situation and concurrently listen to any corresponding sounds.

I was sure that the security industry would recognize this and take action to ensure our physical security systems leverage both sight and sound. However, I found this not to be the case, or even close to the norm. I have pondered the rationale behind why there hasn’t been great adoption and found the deployment of audio to often be hindered by the greater concern of audio and privacy. Over the years as CEO of audio security leader, Louroe Electronics, much of my external efforts have been focused on explaining the laws and practices surrounding the use of audio in security and safety solutions. When designed and implemented by security professionals, the inclusion of audio capture with video surveillance is effective and an important best practice.

My comments below are an extraction of what I have learned about the security industry and the use as well as the avoidance of audio as both an adjunct and a stand-alone solution. With the advent of audio analytics for early threat detection coupled with high performance, audio continues to gain acceptance – even as simple as a good microphone tied into standard security solutions.

Here are my key considerations surrounding the challenges posed by unverified alarms, the need if not the requirement for second source verification, the power of audio, and practical steps that add value to the security system deployed for asset protection and situational alarm events.

Challenges Posed by Unverified Alarms

Police departments across the nation are finding it increasingly difficult to respond to the almost overwhelming number of calls coming from alarm events. Technology deployed today can be very complex. Security systems have commissioning protocols that demand application specific professional attention and earnest calibration during regular maintenance. In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false.* This staggering statistic is the reality for many customers, security monitoring centers, and local law enforcement agencies.

While false alarms bog down first responders, they can also negatively impact customers. Today, end users can incur fines of more than $300 for false alarm responses. When these customers receive large bills from the responding agency, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. Not only does this detract from the bottom line for the security channel, but it can also turn customer relations into a contentious nightmare.

The Need for Secondary Source Verification

With many security system alerts identified as false positives, there is no doubt that a revisit of existing practices is in order with the change needed. As the Alarm Industry desires to address the problem of false alarms, a look at how the security solution can verify these events before calling upon the community safety first responders. A “verified alarm,” according to the International Chiefs of Police, is defined as “an electronic security system event in which a trained central station operator, utilizing a standardized protocol, has determined the presence of human(s) and the high probability that a criminal offense is in progress.”* With a “verified alarm,” law enforcement can elevate the call to a higher priority level, shortening response time and increasing the probability of controlling the event. Surveillance cameras have and will continue to provide the best first level of alarm notice through visual observation. However, given the statistics, there is still a gap in accurate threat substantiation. Consequently, additional authentication must come via new sources of situational activity. Implementing secondary source verification for alarms need to be the standard and audio monitoring is, I propose, the best technology to get the job done.

The Power of Audio

While video surveillance has often been the primary choice for security monitoring and incident validation, industry professionals agree and recognize the limitations of video footage alone. With video, security personnel will only get part of the story. By adding audio to video capture, staff gain a complete solution where additional evidence is gathered to verify alerts and expand situational awareness. Additionally, the area of application for audio easily exceeds the field of view for a camera, enabling the pickup of voices, gunshots, breaking glass or other compelling evidence not within direct view of a security camera. This adds potentially valuable information. Here’s how it works.

With a monitoring solution equipped with audio, the microphone will begin documenting the situation’s sounds when an alarm is triggered. In fact, audio alone can trigger an event, yet it is the professional security integrators who should determine the appropriate technology deployment. The sound(s) captured are immediately sent to the monitoring center, where trained security personnel can listen to the sound clip as well as watch the video of the event in progress from their station. With this information, an informed decision can then be made about the validity of the alarm, along with what may be happening at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes to prioritize a fast response.

The additional information gathered via audio monitoring is not only able to aid in alarm verification, but can also provide context and evidence for first responders arriving at the scene. If gunshots are heard on the recording or live playback, police officers can better assess the situation prior to responding to ensure the safety of those involved. Similarly, two-way audio communications equipment enables real-time dialogue between remote security operators and intruders.

Recommendation

Both the International Chiefs of Police and National Sheriffs Association express their support of implementing electronic security systems to reduce false alarms to deter crime. The time has come to add audio for the benefit of the end-user as a preferred second source of verification. We must progressively act towards capturing sound, viewing audio as an equally essential component as video. I’m calling on our industry associations, organizations, distributors, integrators and public safety agencies to make audio an integral part of the overall security system and alarm verification best practice.

KEYWORDS: alarm monitoring audio monitoring audio security video surveillance

Share This Story

Richard brent
Richard Brent is the CEO of Louroe Electronics.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!