Two Methods That Detect Threats