5.2 Intrusion alarm