Also, generally, they do not provide for wireless systems that are secure from wireless interception or Internet enabled interception and permit remote user access for viewing, reviewing stored information, and controlling the system's components, in particular via Internet connection to a remote controller computer or cellular phone or other Internet connected device.