Abstract: Systems and methods for intrusion detection using a standalone monitor communicating with a monitoring application on a user device. The monitor is generally a self-contained device that does not require third party monitoring services and communicates directly with the user device, or over a local network, such as a home network.