Intrusion systems