Article on the subject of "system intrusion"