The concept of an 'Internet of Things' begins to draw your attention and imagination to embedded systems in the field or on the plant floor. It is important that we start to think about the potential cyber implications to physical breaches. Attacking a system from the edge can be a very effective strategy, especially for certain applications. There are very real vulnerabilities for these systems that can be exploited through IP and serial connections. Physical break-ins and other unauthorized entries into unmanned critical infrastructure locations have historically been viewed only as traditional property crimes. . However, the increased use of computer networks to monitor and control unmanned facilities remotely has also increased the possibility that these traditional physical crimes could be a means or a cover for less discernible cybercrimes.