Perimeter

, EblockWatch1
 * Burglar alarm, BurglarBars,AtmelMicro, Encryption
 * Vehicle traffic, Armored cars , , http://sasecurity.wikia.com/wiki/Category:Microcontroller
 * Security card Correct method for identification using security cards and how RFID is cards are disabled by placing it in a microwave oven for ten seconds.
 * FaradayCage, InfraRedLeds, IrrigationAutomation
 * TrackerDogs, TwistedPair
 * WindowsAutomation
 * https://sasecurity.wikia.com/wiki/Category:Home_automation category home automation
 * CompHomeAutomation, Radar , DcDcConverters
 * EmbeddedPc latte panda, udoo, up board  x86 Win10 SBC ($89)
 * RfActivation, RS485, CAN bus
 * Infrared tripwire, Repair pc power supply
 * AtmelMicro
 * UnderGroundBunker ,
 * Bitcoin ,
 * BoMarc Reverse engineering or circuits, email

http://darkwebnews.com/security-guide/monitoring-antenna/ ".. One researcher was able to use a wireless signal sent by a smart meter from up to 300 meters away (900 feet) to find out which house it was coming from and what the current power consumption was in plain text. She was then able to use this information to determine when people were and were not home based on average spikes in consumption since the meters pulse every 30 seconds. .." Burglars could use tech to determine if person is at home or not.

Securing perimeter

 * Video security incidents this section moved to video security incidents.
 * Securing Perimeter , Perimeter hedge
 * Glass breakage, FiberWireIntrusionMesh
 * BurglarBars are jacked open with a 20 ton car jackk.
 * ConfiguringAlarmSystem
 * AutomaticGateOpeners Gate openers are not designed to prevent forced opening, for this a Z-axis,stepper motor combination is used.
 * SecureSafeInRoom Measures for triggering automatic alert if under duress.
 * BurnPrevention, PreventComputerTheft, LockInsidePipe
 * Gimbal ismartalarm hacking of wireless alarms is to easy.
 * ConfiguringAlarmSystem