Security systems or other applications may have a device which uses the users telephone line, with the user only paying for normal telecommunications service and the security system being charged for services in asociated with calls routed to its destination.