<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[The Tactical Hermit]]></provider_name><provider_url><![CDATA[https://hcsblogdotorg.wordpress.com]]></provider_url><author_name><![CDATA[The Tactical Hermit]]></author_name><author_url><![CDATA[https://hcsblogdotorg.wordpress.com/author/thetacticalhermit/]]></author_url><title><![CDATA[Home Security: Deadbolt&nbsp;Selection]]></title><type><![CDATA[link]]></type><html><![CDATA[<h1 class="entry-title" style="text-align:center;"><img loading="lazy" data-attachment-id="18825" data-permalink="https://hcsblogdotorg.wordpress.com/2016/08/26/home-security-deadbolt-selection/three-deadbolts/" data-orig-file="https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg" data-orig-size="1000,500" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="three-deadbolts" data-image-description="" data-medium-file="https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg?w=300" data-large-file="https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg?w=1000" class="aligncenter size-medium wp-image-18825" src="https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg?w=300&#038;h=150" alt="three-deadbolts" width="300" height="150" srcset="https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg?w=300&amp;h=150 300w, https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg?w=600&amp;h=300 600w, https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg?w=150&amp;h=75 150w" sizes="(max-width: 300px) 100vw, 300px" /></h1>
<h1 class="entry-title" style="text-align:center;"><strong><a href="https://blog.yourultimatesecurity.guide/2016/08/threat-model-based-deadbolt-selection/">THREAT MODEL-BASED DEADBOLT SELECTION</a></strong></h1>
<p style="text-align:center;"><em>(click on title link above to be re-directed to source page)</em></p>
<p style="text-align:center;">
<p>A Great read for any home owner or any Civilian Operator who takes his domicile security seriously!</p>
<p>&nbsp;</p>
<p>Stay Alert, Stay Armed and Stay Dangerous!</p>
]]></html><thumbnail_url><![CDATA[https://hcsblogdotorg.files.wordpress.com/2016/08/three-deadbolts.jpg?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[440]]></thumbnail_width><thumbnail_height><![CDATA[220]]></thumbnail_height></oembed>