Intrusion Countermeasures