Intruder threats and detection