Unwanted Intrusion

What happens next?